This book provides a comprehensive exploration of how artificial intelligence (AI) is revolutionizing cyber risk management, offering advanced methodologies to identify, assess, quantify, and mitigate threats effectively.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4–5, 2025.
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4–5, 2025.
Take the complexity out of privacy management with this guide to ISO 27701:2025 - the go-to resource for anyone who needs a fast, reliable understanding of privacy information management.
This book includes extended and revised versions of a set of selected papers presented at the 20th International Conference on Security and Cryptography, SECRYPT 2023, which took place in Rome, Italy, during July 10–12, 2023; and the 21st International Conference on Security and Cryptography, SECRYPT 2024, which was held in Dijon, France, during July 8-10, 2024.
Libro especializado que se ajusta al desarrollo de la cualificacion profesional y adquisicion del certificado de profesionalidad "e;IFCT0109 - PROGRAMACION DE SISTEMAS INFORMATICOS"e;.
Take the complexity out of privacy management with this guide to ISO 27701:2025 - the go-to resource for anyone who needs a fast, reliable understanding of privacy information management.
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.
This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.
This book constitutes the proceedings of the 14th International Conference on Telematics and Computing, WITCOM 2025, held in Huatulco, Mexico, during November 3–7, 2025.
This book constitutes the proceedings of the 14th International Conference on Telematics and Computing, WITCOM 2025, held in Huatulco, Mexico, during November 3–7, 2025.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d’Ivoire, in November 2024.
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d’Ivoire, in November 2024.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes revised selected papers of the 8th International Conference on Mobile Internet Security, MobiSec 2024, held in Sapporo, Japan, during December 17–19, 2024.
This book constitutes revised selected papers of the 8th International Conference on Mobile Internet Security, MobiSec 2024, held in Sapporo, Japan, during December 17–19, 2024.
Recent advancements in medical and industrial Internet of Things have raised security concerns, as vulnerabilities can impact critical systems, workflows, privacy, and safety.
This book constitutes the proceedings of the 19th International Conference on Provable and Practical Security, ProvSec 2025, which took place in Yokohama, Japan, during October 10–12, 2025.
This book constitutes the proceedings of the 19th International Conference on Provable and Practical Security, ProvSec 2025, which took place in Yokohama, Japan, during October 10–12, 2025.
Recent advancements in medical and industrial Internet of Things have raised security concerns, as vulnerabilities can impact critical systems, workflows, privacy, and safety.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d’Ivoire, in November 2024.
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d’Ivoire, in November 2024.
This book constitutes the refereed proceedings of the 22nd International Conference on Ethical and Social Impacts of Information and Communication Technology, ETHICOMP 2025, held in Lisbon, Portugal, during September 17–19, 2025.
The book is a collection of high-quality peer-reviewed research papers presented in the Tenth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2024) held at Cardiff Metropolitan University, Cardiff, United Kingdom during 9 - 10 December 2024.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.