This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This book constitutes the proceedings of the 31st International Conference on Web Services - ICWS 2024, held as Part of the Services Conference Federation, SCF 2024, in Bangkok, Thailand, during November 16-19, 2024.
This book constitutes the proceedings of the 31st International Conference on Web Services - ICWS 2024, held as Part of the Services Conference Federation, SCF 2024, in Bangkok, Thailand, during November 16-19, 2024.
This book addresses fundamental concepts and practical implementations in cloud computing environments, focusing on load balancing and resource management.
This book constitutes selected papers from the Second International Conference on Cyber Warfare, Security and Space Research, SpacSec 2024, held in Jaipur, India, on February 22-23, 2024.
This comprehensive handbook explores how artificial intelligence is transforming cybersecurity training, with a specific focus on practical implementation strategies for organizations.
This book addresses fundamental concepts and practical implementations in cloud computing environments, focusing on load balancing and resource management.
This book constitutes selected papers from the Second International Conference on Cyber Warfare, Security and Space Research, SpacSec 2024, held in Jaipur, India, on February 22-23, 2024.
This book constitutes the refereed proceedings of the 6th Multidisciplinary International Symposium on Disinformation in Open Online Media, MISDOOM 2024, held in Munster, Germany, during September 2-4, 2024.
This book constitutes the refereed proceedings of the 20th European Workshop on Computer Performance Engineering, EPEW 2024, held in Venice, Italy, on June 14, 2024.
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs.
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
This book constitutes thoroughly refereed post-conference proceedings of the 8th International Symposium on Intelligent Informatics (ISI 2023), December 18-20, 2023, Bangalore, India.
This book constitutes thoroughly refereed post-conference proceedings of the 8th International Symposium on Intelligent Informatics (ISI 2023), December 18-20, 2023, Bangalore, India.
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024.
Digital twin technologies, currently at the forefront of development, play a crucial role in integrated systems, industrial design, manufacturing, data analytics, and decision-making processes.
Digital twin technologies, currently at the forefront of development, play a crucial role in integrated systems, industrial design, manufacturing, data analytics, and decision-making processes.
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024.
This volume gives readers an understanding of the multifaceted threats posed by the evolving cybersecurity landscape in smart environments, while also offering strategic insights into mitigative measures and proactive solutions.
This book uncovers and presents various real-life applications in the areas of transportation, smart cities, manufacturing, agriculture, disaster management, finance, health care and in other areas by using cutting-edge advanced Machine Learning (ML) techniques such as Deep Learning and Explainable AI (XAI) models using IoT sensor data.
This volume gives readers an understanding of the multifaceted threats posed by the evolving cybersecurity landscape in smart environments, while also offering strategic insights into mitigative measures and proactive solutions.
This book uncovers and presents various real-life applications in the areas of transportation, smart cities, manufacturing, agriculture, disaster management, finance, health care and in other areas by using cutting-edge advanced Machine Learning (ML) techniques such as Deep Learning and Explainable AI (XAI) models using IoT sensor data.
Edge computing has emerged as a powerful technology for efficiently executing tasks by pushing cloud computing capabilities to the edge of the network.
This volume LNCS constitutes the refereed proceedings of the 21st International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2025, in Bhubaneswar, in India, in January 2025.
This book constitutes the proceedings of the 7th International Conference on Blockchain - ICBC 2024, held as part of the Services Conference Federation, SCF 2024, held in Bangkok, Thailand, during November 16-19, 2024.
This book constitutes the refereed proceedings of the 28th International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2024, held in Venice, Italy, on June 14, 2024.