This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Image Analysis and Recognition, ICIAR 2017, held in Montreal, QC, Canada, in July 2017.
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.
This book proposes a new approach to dynamic and online risk assessment of automated and autonomous marine systems, taking into account different environmental and operational conditions.
This book constitutes the thoroughly refereed proceedings of the 24th International Conference on Computer Networks, CN 2017, held in Brunow, Poland, in June 2017.
This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016.
The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2016, held in Beijing, China, in November 2016.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
This book constitutes the refereed proceedings of the 14th International Symposium on Neural Networks, ISNN 2017, held in Sapporo, Hakodate, and Muroran, Hokkaido, Japan, in June 2017.
This book constitutes the refereed proceedings of the 14th International Symposium on Neural Networks, ISNN 2017, held in Sapporo, Hakodate, and Muroran, Hokkaido, Japan, in June 2017.
This book constitutes the refereed proceedings of the 7th International Conference on E-Technologies, MCETECH 2017, held in Ottawa, ON, Canada, in May 2017.
The two-volume set LNCS 10297 + 10298 constitutes the refereed proceedings of the Third International Conference on Human Aspects of IT for the Aged Population, ITAP 2017, held as part of HCI International 2017 in Vancouver, BC, Canada.
The two-volume set LNCS 10297 + 10298 constitutes the refereed proceedings of the Third International Conference on Human Aspects of IT for the Aged Population, ITAP 2017, held as part of HCI International 2017 in Vancouver, BC, Canada.
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017.
This book constitutes the thoroughly refereed conference proceedings of the Fourth International Workshop on Risk Assessment and Risk-Driven Quality Assurance, RISK 2016, held in conjunction with ICTSS 2016, in Graz, Austria, in October 2016.
This two-volume set, LNAI 10234 and 10235, constitutes the thoroughly refereed proceedings of the 21st Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2017, held in Jeju, South Korea, in May 2017.
This book constitutes the refereed proceedings of the 12th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2017, held in Jeju Island, South Korea, in May 2017 in conjunction with PAKDD 2017, the 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining.
This two-volume set, LNAI 10234 and 10235, constitutes the thoroughly refereed proceedings of the 21st Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2017, held in Jeju, South Korea, in May 2017.
This descriptive, practical guide explains how to build a commercially impactful, operationally effective and technically robust IoT ecosystem that takes advantage of the IoT revolution and drives business growth in the consumer IoT as well as industrial internet spaces.
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.
This book constitutes the refereed proceedings of the 13th European Conference on Ambient Intelligence, AmI 2017, held in Malaga, Spain, in April 2017.
This book constitutes the proceedings of the Third Workshop on Video Analytics for Audience Measurement, VAAM 2016, and the Second International Workshop on Face and Facial Expression Recognition from Real World Videos, FFER 2016, held at the 23rd International Conference on Pattern Recognition, ICPR 2016, in Cancun, Mexico, in December 2016.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on the Arithmetic of Finite Field, WAIFI 2016, held in Ghent, Belgium, in July 2016.
This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers.
This book covers many aspects of cyberspace, emphasizing not only its possible 'negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Computational Modeling of Objects Presented in Images, CompIMAGE 2016, held in Niagara Falls, NY, USA, in September 2016.
This book presents a comprehensive overview of the computerized core monitoring techniques currently employed at pressurized water reactor (PWR) and boiling water reactor (BWR) nuclear power plants.
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016.
This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016.
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016.
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016.
Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications.
This book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017.