This volume constitutes the refereed proceedings of the Third International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2020, held in Agartala, India, in December 2020.
This volume constitutes the refereed post-conference proceedings of the 5th International Conference on Machine Learning and Intelligent Communications, MLICOM 2020, held in Shenzhen, China, in September 2020.
This book constitutes the refereed proceedings of the 9th International Conference on Computational Data and Social Networks, CSoNet 2020, held in Dallas, TX, USA, in December 2020.
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.
This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.
This book constitutes the refereed proceedings of the 6th International Conference on Security Standardisation Research, SSR 2020, held in London, UK, in November 2020.
This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Mobile Computing, Applications, and Services, MobiCASE 2020, held in Shanghai, China, in September 2020.
This book looks at the growing segment of Internet of Things technology (IoT) known as Internet of Medical Things (IoMT), an automated system that aids in bridging the gap between isolated and rural communities and the critical healthcare services that are available in more populated and urban areas.
This book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, which was supposed to be held in Quy Nhon, Vietnam, in November 2020, but the conference was held virtually due to the COVID-19 pandemic.
This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains.
This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020.
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system.
This book provides an overview of fake news detection, both through a variety of tutorial-style survey articles that capture advancements in the field from various facets and in a somewhat unique direction through expert perspectives from various disciplines.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020.
This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.
This book constitutes the refereed proceedings of the 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, which was supposed take place in Tokyo, Japan, in September 2020, but the conference was cancelled due to the COVID-19 crisis.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020.
This book provides a comprehensive and self-contained introduction to federated learning, ranging from the basic knowledge and theories to various key applications.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020.
This book sheds light on the challenges facing social media in combating malicious accounts, and aims to introduce current practices to address the challenges.
This book constitutes the proceedings of the 13th International Conference on Social, Cultural, and Behavioral Modeling, SBP-BRiMS 2020, which was planned to take place in Washington, DC, USA.
This book constitutes revised papers from the five workshops which were held during June 2020 at the 23rd International Conference on Business Information Systems, BIS 2020.
This book constitutes late breaking papers from the 22nd International Conference on Human-Computer Interaction, HCII 2020, which was held in July 2020.
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures.
This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge).