This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Wireless and Satellite Services, WiSATS 2022, held in March 12-13, 2023.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2022, which took place in Sousse, Tunesia, during December 7-9, 2022.
This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8-9, 2022.
This book highlights the latest advancements, innovation, technology, and real-world challenges and solutions related to smart critical infrastructure.
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.
This book discusses automated computing systems which are mostly powered by intelligent technologies like artificial intelligence, machine learning, image recognition, speech processing, cloud computing, etc.
This comprehensive handbook explores how artificial intelligence is transforming cybersecurity training, with a specific focus on practical implementation strategies for organizations.
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.
Machine learning (ML) models, especially large pretrained deep learning (DL) models, are of high economic value and must be properly protected with regard to intellectual property rights (IPR).
This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS 2022, held in Xiamen, China, during December 8-12, 2022.
This book features research papers presented at the 1st International Conference on Innovations in Data Analytics (ICIDA 2022), held at Eminent College of Management and Technology (ECMT), West Bengal, India, during November 29-30, 2022.
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.
Machine learning (ML) models, especially large pretrained deep learning (DL) models, are of high economic value and must be properly protected with regard to intellectual property rights (IPR).
This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS 2022, held in Xiamen, China, during December 8-12, 2022.
This book features research papers presented at the 1st International Conference on Innovations in Data Analytics (ICIDA 2022), held at Eminent College of Management and Technology (ECMT), West Bengal, India, during November 29-30, 2022.
This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where digital interconnectivity is paramount yet vulnerable.
This book highlights the latest advancements, innovation, technology, and real-world challenges and solutions related to smart critical infrastructure.
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Wireless and Satellite Services, WiSATS 2022, held in March 12-13, 2023.
This book discusses automated computing systems which are mostly powered by intelligent technologies like artificial intelligence, machine learning, image recognition, speech processing, cloud computing, etc.
This book gathers extended versions of papers presented at DoSIER 2023 (Fifth Doctoral Symposium on Intelligence Enabled Research, held at Cooch Behar Government Engineering College, West Bengal, India, during December 20-21, 2023).
The sixth-generation (6G) communication systems are anticipated to provide network connectivity for an extensive range of use cases in a variety of emerging vertical industries.
This book provides a holistic and comprehensive approach to deep learning for vehicular ad hoc networks (VANETs), covering various aspects such as applications, agency involvement, and potential ethical and legal issues.
This volume, the 36th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains eight revised, extended papers selected from the 3rd International Conference on Future Data and Security Engineering, FDSE 2016, and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016, which were held in Can Tho City, Vietnam, in November 2016.
This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs.
This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field.
The book provides insights into International Conference on Smart Innovations in Communications and Computational Sciences (ICSICCS 2017) held at North West Group of Institutions, Punjab, India.
The book provides insights into International Conference on Smart Innovations in Communications and Computational Sciences (ICSICCS 2017) held at North West Group of Institutions, Punjab, India.
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India.
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India.
This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017.
This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.
This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017.
This volume, the 35th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five fully-revised selected regular papers focusing on data quality, social-data artifacts, data privacy, predictive models, and e-health.