This comprehensive text/reference presents a broad-ranging overview of device connectivity in distributed computing environments, supporting the vision of an Internet of Things (IoT).
The six volume set LNCS 10634, LNCS 10635, LNCS 10636, LNCS 10637, LNCS 10638, and LNCS 10639 constitues the proceedings of the 24rd International Conference on Neural Information Processing, ICONIP 2017, held in Guangzhou, China, in November 2017.
The six volume set LNCS 10634, LNCS 10635, LNCS 10636, LNCS 10637, LNCS 10638, and LNCS 10639 constitues the proceedings of the 24rd International Conference on Neural Information Processing, ICONIP 2017, held in Guangzhou, China, in November 2017.
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016.
This volume constitutes the refereed proceedings of the 9th International Conference on Multimedia Communications, Services and Security, MCSS 2017, held in Krakow, Poland, in November 2017.
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.
This book constitutes the proceedings of the 9th International Symposium on Cyberspace Safety and Security, CSS 2017, held in Xi'an, China in October 2017.
This double volumes LNCS 10573-10574 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2017, Ontologies, Databases, and Applications of Semantics, ODBASE 2017, and Cloud and Trusted Computing, C&TC, held as part of OTM 2017 in October 2017 in Rhodes, Greece.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017.
This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others.
This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.
This book constitutes the refereed proceedings of the Second International Joint Conference on Electronic Voting, E-Vote-ID 2017, held in Bregenz, Austria, in October 2017.
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017.
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches.
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.
This volume constitutes the proceedings of the Second International Conference on Reliability, Safety and Security of Railway Systems, RRSRail 2017, held in Pistoia, Italy, in November 2017.
This volume constitutes the refereed post-conference proceedings of the First IFIP TC 5 DCDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2016, held in Sofia, Bulgaria, in November 2016.
This book constitutes the refereed proceedings of the Third International Conference on Geometric Science of Information, GSI 2017, held in Paris, France, in November 2017.
This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017.
This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2017, held in Messina, Italy, in September 2017.
This book provides a first course on lattices - mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematicians for their structure and, at the same time, are used by electrical and computer engineers working on coding theory and cryptography.
This book constitutes the refereed proceedings of the 13th International Joint Conference on E-Business and Telecommunications, ICETE 2016, held in Lisbon, Portugal, in July 2016.
This book constitutes the refereed proceedings of the First International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2017, held in Marrakech, Morocco, in March 2017.
This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2017.
This book constitutes the proceedings of the 28th International Tyrrhenian Workshop on Digital Communication, TIWDC 2017, which took place in Palermo, Italy, in September 2017.
This book constitutes the proceedings of the Second International Conference on Cloud, Networking for IoT Systems, CN4IoT 2017, and the Second EAI International Conference on ICT Infrastructures and Services for Smart Cities, IISSC 2017, held in Brindisi, Italy, in April 2017.
This book constitutes the refereed proceedings of the 9th International Conference on Data-Driven Innovation, ICT Innovations 2017, held in Skopje, Macedonia, in September 2017.
This book constitutes the refereed proceedings of the 17th International Conference on Runtime Verification, RV 2017, held in Seattle, WA, USA, in September 2017.
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field.
This book contains a selection of the best papers that were presented at the 28th edition of the annual Benelux Conference on Artificial Intelligence, BNAIC 2016.
This book constitutes the joint refereed proceedings of the 17th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2017, the 10th Conference on Internet of Things and Smart Spaces, ruSMART 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Communication Systems and Networks, COMSNETS 2017, held in Bengaluru, India, in January 2017.
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017.
The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016.
The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016.