Forgeries present a daunting problem to art historians, museums, galleries and curators who face challenges in determining the authenticity of paintings.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
This book describes an accurate analysis technique for energy systems based on formal methods-computer-based mathematical logic techniques for the specification, validation, and verification of the systems.
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography.
The book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2022), organized by GITAM School of Technology, Bangalore, India, during 3-4 February 2022.
This book contains the refereed proceedings of the 15th International Conference on Knowledge Management in Organizations, KMO 2021, held in Kaohsiung, Taiwan, in July 2021.
This book constitutes the proceedings of the Second International Conference on Spatial Data and Intelligence, SpatialDI 2021, which was held during April 22-24, 2021 in Hangzhou, China.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
Gathering the proceedings of the 11th CHAOS2018 International Conference, this book highlights recent developments in nonlinear, dynamical and complex systems.
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018.
This textbook is designed for an introductory, one-semester course in Control Systems for undergraduates and graduates in various engineering departments, such as electrical, mechanical, aerospace, and civil.
Computer-Controlled Systems with Delay is a systematic study of the problems of analysis and synthesis for multidimensional sampled-data (SD) systems with delay.
Statistics Explained, now in its fully revised Fourth Edition, is for students and researchers who wish to understand the statistical analyses used to analyse quantitative (numerical) research data in a wide range of academic disciplines, in particular, the behavioural, human and social sciences.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
This book analyses the raising of capital imposed by regulatory and supervisory constraints for the soundness and survival of banks in Europe, highlighting critical issues.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021.
This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns.
This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019.
This book presents a unified mathematical treatment of diverse problems in thegeneral domain of robotics and associated fields using Clifford or geometric alge-bra.
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, held in Cairo, Egypt, in July 2020.
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020.
This book systematically presents a fundamental theory for the local analysis of bifurcation and stability of equilibriums in nonlinear dynamical systems.
This two-volume set of LNCS 12188 and 12189 constitutes the refereed proceedings of the 14th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020.
This book provides a line of communication between academia and end users/practitioners to advance forensic science and boost its contribution to criminal investigations and court cases.
Forensic Science Reform: Protecting the Innocent is written for the nonscientist to help make complicated scientific information clear and concise enough for attorneys and judges to master.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.
This book constitutes the proceedings of the 6th International Conference on Electronic Voting, E-Vote-ID 2021, held online -due to COVID -19- in Bregenz, Austria, in October 2021.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020.
This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017.
This book studies selected discrete-time flight control schemes for fixed-wing unmanned aerial vehicle (UAV) systems in the presence of system uncertainties, external disturbances and input saturation.
Pulling together into a single framework the two separate disciplines of strategy management and risk management, this book provides a practical guide for organizations to shape and execute sustainable strategies with full understanding of how much risk they are willing to accept in pursuit of strategic goals.
Build a blue team for efficient cyber threat management in your organizationKey FeaturesExplore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementationBook DescriptionWe've reached a point where all organizational data is connected through some network.