This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
This handbook offers a thorough examination of the ever-changing landscape of cybersecurity, exploring the critical challenges and innovative solutions that shape the field during the era of digital transformation.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
This book introduces students to the challenges related to international crime and punishment and the ways that criminal justice systems have sought to confront them.
This book introduces students to the challenges related to international crime and punishment and the ways that criminal justice systems have sought to confront them.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
This book constitutes the refereed proceedings of the 12th International Conference on Future Data and Security Engineering, FDSE 2025, held in Ho Chi Minh City, Vietnam, during November 27–29, 2025.
This book constitutes the refereed proceedings of the 12th International Conference on Future Data and Security Engineering, FDSE 2025, held in Ho Chi Minh City, Vietnam, during November 27–29, 2025.
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17–20, 2025.
This book constitutes the proceedings of the 20th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2025, held in Fukuoka, Japan, in November 25, 2025.
This book constitutes the proceedings of the 20th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2025, held in Fukuoka, Japan, in November 25, 2025.
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17–20, 2025.
This book presents selected papers from International Conference on Responsible Artificial Intelligence (ICRAI 2024), held on 16–17 December 2024, in Mangalore University, Mangalore, India.
This book presents selected papers from International Conference on Responsible Artificial Intelligence (ICRAI 2024), held on 16–17 December 2024, in Mangalore University, Mangalore, India.
This book constitutes the refereed proceedings of the 12th International Conference on Future Data and Security Engineering, FDSE 2025, held in Ho Chi Minh City, Vietnam, during November 27–29, 2025.
This book constitutes the refereed proceedings of the 12th International Conference on Future Data and Security Engineering, FDSE 2025, held in Ho Chi Minh City, Vietnam, during November 27–29, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
This handbook offers a thorough examination of the ever-changing landscape of cybersecurity, exploring the critical challenges and innovative solutions that shape the field during the era of digital transformation.