This book, embarks the reader on a journey into the forefront of innovation where science, engineering, and technology converge to address the pressing challenges of our time.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025, which was held in Vienna, Austria, during June 16-20, 2025.
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security.
Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.
Cross-technology communication (CTC) is a technology that enables direct communication between heterogeneous devices that use different wireless standards.
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024.
The book "e;AI-Enabled Healthcare Security: Safeguarding Patient Data and Improving Outcomes"e; focuses on the role of artificial intelligence in enhancing healthcare security and improving patient outcomes.
This book includes selected papers presented at the International Conference on Marketing and Technologies (ICMarkTech 2023), held at Faculty of Economics and Management (FEM), Czech University of Life Sciences Prague (CZU), in partnership with University College Prague (UCP), in Prague, Czech Republic, between 30 November and 2 December 2023.
Cross-technology communication (CTC) is a technology that enables direct communication between heterogeneous devices that use different wireless standards.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book covers several essential aspects of pervasive ambient backscatter communication, one of the most cutting-edge technologies for Internet-of-Things.
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book constitutes the refereed proceedings of the 18th International Conference on Network and System Security, NSS 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024.
This book includes selected papers presented at the International Conference on Marketing and Technologies (ICMarkTech 2023), held at Faculty of Economics and Management (FEM), Czech University of Life Sciences Prague (CZU), in partnership with University College Prague (UCP), in Prague, Czech Republic, between 30 November and 2 December 2023.
This book, embarks the reader on a journey into the forefront of innovation where science, engineering, and technology converge to address the pressing challenges of our time.
The cyber infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
Software Telemetry shows you how to efficiently collect, store, and analyze system and application log data so you can monitor and improve your systems.
Build and use systems that safely automate software delivery from testing through release with this jargon-busting guide to continuous delivery pipelines.
SummaryServerless Architectures on AWS teaches you how to build, secure and manage serverless architectures that can power the most demanding web and mobile apps.