This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13–14, 2024.
In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management.
This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment.
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression.
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it.
In this book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes.
The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime.
The safe operation of computer systems continues to be a key issue in many applications where people, environment, investment, or goodwill can be at risk.
Recent and well-publicised disasters have highlighted the fact that organisations of all kinds - from healthcare to aerospace - are critically dependent on Information Technology systems.
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;What is security?
This book discusses Metaverse Technology, which is one of the emerging technologies around the world, through its concepts, definitions, architectural layers, economic implications, and presents comparison points with other allied areas like Web 3.
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, which was held in Dubai, UAE, during December 11-12, 2023.
This book provides an in-depth treatment of three important topical areas related to regulatory, ethical, and technical discussions in the context of information retrieval and recommender systems (IRRSs): (1) bias, fairness, and non-discrimination, (2) transparency and explainability, and (3) privacy and security.
This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.
The book "e;AI-Enabled Healthcare Security: Safeguarding Patient Data and Improving Outcomes"e; focuses on the role of artificial intelligence in enhancing healthcare security and improving patient outcomes.
This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous monitoring.
'Reasonable expectations of privacy' have become a cornerstone concept in privacy and data protection legislation worldwide, extending today from US constitutional law to the GDPR, Article 8 ECHR, and various Asian and African data protection frameworks.
The cyber infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This book is the 2nd volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024.
This book constitutes the refereed proceedings of the 18th International Conference on Network and System Security, NSS 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025, which was held in Vienna, Austria, during June 16-20, 2025.
Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.