This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students.
This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019.
This book constitutes the refereed proceedings of the 4th International Conference on Smart Computing and Communications, SmartCom 2019, held in Birmingham, UK, in October 2019.
This book constitutes the refereed proceedings of the Second International Conference on Smart Blockchain, SmartBlock 2019, held in Birmingham, UK, in October 2019.
This book constitutes the refereed proceedings of the 6th International Conference on Advances in Visual Informatics, IVIC 2019, held in Bangi, Malaysia, in November 2019.
This book constitutes the refereed post-conference proceedings for the VLBD conference workshops entitled: Towards Polystores That Manage Multiple Databases, Privacy, Security and/or Policy Issues for Heterogenous Data (Poly 2019) and the Fifth International Workshop on Data Management and Analytics for Medicine and Healthcare (DMAH 2019), held in Los Angeles, CA, USA, in August 2019, in conjunction with the 45th International Conference on Very Large Data Bases, VLDB 2019.
This book constitutes the refereed proceedings of the 14th International Symposium on Visual Computing, ISVC 2019, held in Lake Tahoe, NV, USA in October 2019.
This book constitutes the refereed proceedings of the 14th International Symposium on Visual Computing, ISVC 2019, held in Lake Tahoe, NV, USA in October 2019.
This book constitutes the refereed proceedings of the 5th International Conference on Future Network Systems and Security, FNSS 2019, held in Melbourne, Australia, in November 2019.
This book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This book constitutes revised and selected papers from the Second International Congress on High-Performance Computing and Big Data Analysis, TopHPC 2019, held in Tehran, Iran, in April 2019.
This book constitutes the thoroughly refereed papers of the workshops held at the 9th International Conference on New Trends in Model and Data Engineering, MEDI 2019, in Toulouse, France, in October 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, held in St.
This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019.
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network.
This book constitutes the proceedings of the 6th International Symposium on Model-Based Safety and Assessment, IMBSA 2019, held inThessaloniki, Greece, in October 2019.
This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology.
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019.
This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019, held in Luxembourg in September 2019.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
This book constitutes the contributions presented at the Blockchain Forum and the Central and Eastern Europe Forum (CEE Forum) held at the 17th International Conference on Business Process Management, BPM 2019, which took place in Vienna, Austria, in September 2019.
This book constitutes the refereed proceedings of the 25th International Conference on Information and Software Technologies, ICIST 2019, held in Vilnius, Lithuania, in October 2019.
This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019.
This book constitutes the refereed proceedings of the 5th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2019, held in Ho Chi Minh City, Vietnam, in August 2019.
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.
This book constitutes the proceedings of the 18th International Conference on Perspectives in Business Informatics Research, BIR 2019, held in Katowice, Poland, in September 2019.
This volume constitutes the refereed proceedings of the 6th Workshop on Engineering Applications, WEA 2019, held in Santa Marta, Colombia, in October 2019.
This book constitutes the refereed proceedings of the 11th International Workshop on Software Engineering for Resilient Systems, SERENE 2019, held in Naples, Italy, in September 2019.
This book constitutes the proceedings of the Second International Conference on Machine Learning for Cyber Security, ML4CS 2019, held in Xi'an, China in September 2019.
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018.
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.
This book constitutes the thoroughly refereed proceedings of the 4th International Conference on Geographical Information Systems Theory, Applications and Management, GISTAM 2018, held in Funchal, Madeira, Portugal, in March 2018.
This three-volume set LNAI 11670, LNAI 11671, and LNAI 11672 constitutes the thoroughly refereed proceedings of the 16th Pacific Rim Conference on Artificial Intelligence, PRICAI 2019, held in Cuvu, Yanuca Island, Fiji, in August 2019.
The two volume set LNCS 11678 and 11679 constitutes the refereed proceedings of the 18th International Conference on Computer Analysis of Images and Patterns, CAIP 2019, held in Salerno, Italy, in September 2019.
This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019.
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.