This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and Security, FNSS 2018, held in Paris, France, in July 2018.
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.
This book constitutes the refereed proceedings of the 18th International Conference on Product-Focused Software Process Improvement, PROFES 2017, held in Innsbruck, Austria, in November/December 2017.
This book contains the revised and extended versions of selected papers from the 12th International Conference on Agents and Artificial Intelligence, ICAART 2020, held in Valletta, Malta, in February 2020.
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017.
This book constitutes the proceedings of the Third Joint International Conference on Serious Games, JCSG 2017, held in Valencia, Spain, in November 2017.
The book analyzes the use of smart medical devices that use artificial intelligence and machine learning to analyze medical images, detect diseases, and assist in diagnosis.
This book constitutes the refereed proceedings of the 12th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2017, held in Jeju Island, South Korea, in May 2017 in conjunction with PAKDD 2017, the 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining.
This book constitutes the refereed proceedings of the 5th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2017, held as part of the 19th International Conference on Human-Computer Interaction, HCII 2017, held in Vancouver, BC, Canada, in July 2017.
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.
Optimization of Manufacturing Systems Using the Internet of Things extends the IoT (Internet of Things) into the manufacturing field to develop an IoMT (Internet of Manufacturing Things) architecture with real-time traceability, visibility, and interoperability in production planning, execution, and control.
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.
Cloud Computing: Theory and Practice, Second Edition, provides students and IT professionals with an in-depth analysis of the cloud from the ground up.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.
Advances in Computers, the latest volume in the series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Personal Analytics and Privacy, PAP 2017, held in Skopje, Macedonia, in September 2017.
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018.
This book constitutes the proceedings of the First International Conference on Intelligent Transport Systems, INTSYS 2107, which was held in Helsinki, Finland, in November 2017.
This book is a critical examination of the philosophical and moral issues in relation to human enhancement and the various related medical developments that are now rapidly moving from the laboratory into the clinical realm.
The five volume set LNCS 10960 until 10964 constitutes the refereed proceedings of the 18th International Conference on Computational Science and Its Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
This volume constitutes the refereed proceedings of the 25th European Conference on Systems, Software and Services Process Improvement, EuroSPI conference, held in Bilbao, Spain, in September 2018.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Designing for a Digital and Globalized World, DESRIST 2019, held Worcester, MA, USA, June 2019.
This book constitutes the proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, S+SSPR 2020, held in Padua, Italy, in January 2021.
This book constitutes the refereed post-conference proceedings of the 16th International Conference on Persuasive Technology, PERSUASIVE 2021, held as a virtual event, in April 2021.
This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.
This two-volume set LNCS 11588 and 11589 constitutes the refereed proceedings of the 6th International Conference on Business, Government, and Organizations, HCIBGO 2019, held in July 2019 as part of HCI International 2019 in Orlando, FL, USA.
This book constitutes the refereed proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2018, held in Funchal, Madeira, Portugal, in March 2018.
This book constitutes the proceedings of the 18th International Conference on Software and Systems Reuse, ICSR 2019, held in Cincinnati, Ohio, USA in June 2019.
This book constitutes the refereed proceedings of the 25th International Static Analysis Symposium, SAS 2018, held in Freiburg, Germany, in August 2018.
This book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Smart Cities and Green ICT Systems, SMARTGREENS 2018, and the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2018, held in Funchal-Madeira, Portugal in March 2018.
The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021.
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018.