This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
Los avances en la ciencia del cerebro y las neurotecnologias abren nuevas vias para mejorar el diagnostico y el tratamiento de los trastornos mentales, y de las enfermedades neurologicas en general.
This brief addresses the contested relationship between an individual’s right of access to his or her personal data under data protection law and the protection of a whistleblower’s identity.
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT) holds the potential for revolutionary changes in our daily lives.
This brief addresses the contested relationship between an individual’s right of access to his or her personal data under data protection law and the protection of a whistleblower’s identity.
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT) holds the potential for revolutionary changes in our daily lives.
The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates all interactions in a cloud environment.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates all interactions in a cloud environment.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This CCIS post conference volume constitutes the proceedings of the First International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2024, in Bari, Italy, in October 2024.
This CCIS post conference volume constitutes the proceedings of the First International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2024, in Bari, Italy, in October 2024.
This volume LNCS 13855 book constitutes the refereed proceedings of the 12th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2022, which held in Copenhagen, Denmark, during September 26, 2022.
This volume LNCS 13855 book constitutes the refereed proceedings of the 12th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2022, which held in Copenhagen, Denmark, during September 26, 2022.
This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12-14, 2024.
This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12-14, 2024.