The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shor’s and Grover’s) and state-of-the-art machine learning methods.
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
This book systematically addresses the security and resilience of networked agent systems, from sensor networks to general multi-agent systems, against evolving cyber threats.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
This book provides an in-depth comparative study of legal responses to cyberterrorism in China and the UK to establish whether the relationship between legal systems and legal responses is necessary or contingent in the case of counter-cyberterrorism.
This brief addresses the contested relationship between an individual’s right of access to his or her personal data under data protection law and the protection of a whistleblower’s identity.
This book serves as a comprehensive guide to learning various aspects of financial fraud, encompassing the related research, the current situation, potential causes, implementation process, detection methods, regulatory penalties and management challenges in publicly listed companies.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT) holds the potential for revolutionary changes in our daily lives.
This book provides an in-depth comparative study of legal responses to cyberterrorism in China and the UK to establish whether the relationship between legal systems and legal responses is necessary or contingent in the case of counter-cyberterrorism.
This brief addresses the contested relationship between an individual’s right of access to his or her personal data under data protection law and the protection of a whistleblower’s identity.
This book lays a systematic foundation for professionals, researchers, and industry readers who are interested the applications and implications of generative AI for cybersecurity.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT) holds the potential for revolutionary changes in our daily lives.
This book serves as a comprehensive guide to learning various aspects of financial fraud, encompassing the related research, the current situation, potential causes, implementation process, detection methods, regulatory penalties and management challenges in publicly listed companies.
This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2024), hosted by Christ (Deemed to be University), India, and technically sponsored by The Tejas Scientific Researcher Foundation, India, from 08–09 November, 2024.
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Analytics and Insights (ICDAI 2024), organized by Techno International, Kolkata, India, during July 25-27, 2024.
This book features peer-reviewed papers from the International Conference on Recent Developments in Cyber Security, organized by the Center for Cyber Security and Cryptology.
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Analytics and Insights (ICDAI 2024), organized by Techno International, Kolkata, India, during July 25-27, 2024.
This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2024), hosted by Christ (Deemed to be University), India, and technically sponsored by The Tejas Scientific Researcher Foundation, India, from 08–09 November, 2024.
This book features peer-reviewed papers from the International Conference on Recent Developments in Cyber Security, organized by the Center for Cyber Security and Cryptology.
Mastering computer security requires more than just technical knowledge of software, systems and networks—it demands analytical thinking, a problem-solving mindset, and creative reasoning.