In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology.
This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cyber crime.
This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019.
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018.
This book constitutes the refereed conference proceedings of the Second International Conference on Emerging Technologies in Computing, iCEtiC 2019, held in London, UK, in August 2019.
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018.
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019.
This book contains the refereed proceedings of the 14th International Conference on Knowledge Management in Organizations, KMO 2019, held in Zamora, Spain, in July 2019.
This book constitutes the refereed proceedings of the 33rd Canadian Conference on Artificial Intelligence, Canadian AI 2020, which was planned to take place in Ottawa, ON, Canada.
This book constitutes the refereed proceedings of the 5th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2019, held in Ho Chi Minh City, Vietnam, in August 2019.
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*.
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.
This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022.
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum-Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection.
This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020.
The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.
Resilience Engineering (RE) studies have successfully identified and described many instances of resilient performance in high hazard sectors as well as in the far more frequent cases where people and organisations cope with the uncertainties of daily operations.
This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020.
This book constitutes the thoroughly refereed proceedings of the 4th International Conference on Geographical Information Systems Theory, Applications and Management, GISTAM 2018, held in Funchal, Madeira, Portugal, in March 2018.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection between two transformative technologies: big data and blockchain, and their integration into securing Internet of Things (IoT) applications.
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach.
This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different "e;layers"e; in designing the use of blockchain/Distributed Ledger Technology (DLT) for social trust, trust in data and records, and trust in systems.
This book constitutes selected papers from the 19th International Conference on Transport Systems Telematics, TST 2019, held in Jaworze, near Bielsko-Biala, Poland, in March 2019.
This book constitutes the revised selected papers from the 12th International Conference on Risk and Security of Internet and Systems, CRISIS 2017, held in Dinard, France, in September 2017.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.
This book constitutes the refereed post-conference proceedings of the 22nd Iberoamerican Congress on Pattern Recognition, CIARP 2017, held in Valparaiso, Chile, in November 2017.
This book constitutes the proceedings of the First International Conference on 5G for Future Wireless Networks, 5GWN 2017, held in Beijing, China, in April 2017.
This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2021, held in November 2020.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2022, CT-RSA 2022, held in San Francisco, CA, USA, in February 2022.
The 3 volume-set LNCS 10901, 10902 + 10903 constitutes the refereed proceedings of the 20th International Conference on Human-Computer Interaction, HCI 2018, which took place in Las Vegas, Nevada, in July 2018.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.
This volume constitutes the refereed post-conference proceedings of the First IFIP TC 5 DCDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2016, held in Sofia, Bulgaria, in November 2016.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022.
This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020.
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology - New Generations, held at Las Vegas.
This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS).
This book constitutes the proceedings of the Third International Conference on Blockchain, ICBC 2020, held as part of SCF 2020, during September 18-20, 2020.
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.
This book constitutes revised selected papers from the jointly held conferences FHIES 2014, 4th International Symposium on Foundations of Health Information Engineering and Systems, and SEHC 2014, 6th International Workshop on Software Engineering in Health Care.
This book constitutes the proceedings of the First International Conference on Smart Computing and Communication, SmartCom 2016, held in Shenzhen, China, in December 2016.