This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013.
This book constitutes the thoroughly refereed proceedings of the 15 International Symposium on Stabilization, Safety and Security of Distributed Systems, SSS 2013, held in Osaka, Japan, in November 2013.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013.
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013.
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes.
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks.
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks.
This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO).
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
This book sheds light on the challenges facing social media in combating malicious accounts, and aims to introduce current practices to address the challenges.
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022.
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT.
This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, held in Nanjing, China, in December 2020.
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named "e;ATM Hacking.
This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.
This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS).
This book contains a selection of the best papers that were presented at the 28th edition of the annual Benelux Conference on Artificial Intelligence, BNAIC 2016.
This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017.
This monograph focuses on the design of personalized and adaptive online interactive learning environment (OILE) to enhance students' learning in and about complex dynamic systems (CDS).
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures.
Artificial intelligent systems, which offer great improvement in healthcare sector assisted by machine learning, wireless communications, data analytics, cognitive computing, and mobile computing provide more intelligent and convenient solutions and services.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain.
Die Autorin stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen.
The book addresses the impact of ambient intelligence, particularly its user-centric context-awareness requirement on data management strategies and solutions.
Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era.
The book addresses the impact of ambient intelligence, particularly its user-centric context-awareness requirement on data management strategies and solutions.
Die Autorin stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen.
Noch vor wenigen Jahren war die IT-Sicherheit eher ein Randgebiet, doch inzwischen ist sie in der Informatik, in Unternehmen und auch im Alltagsleben allgegenwärtig.
Noch vor wenigen Jahren war die IT-Sicherheit eher ein Randgebiet, doch inzwischen ist sie in der Informatik, in Unternehmen und auch im Alltagsleben allgegenwärtig.
Dieses kompakte Grundlagen-Lehrbuch orientiert sich in Inhalt und Aufbau an einer einführenden Vorlesung zum Thema Mensch-Maschine-Interaktion und lehnt sich an das von der Association for Computing Machinery (ACM) vorgeschlagene Curriculum des Gebiets an.