This book presents a selection of scientific peer reviewed articles presented at the 6th International Conference on Advanced Materials for Photonics, Sensing, and Energy Applications (AMPSECA 2024) held on 31Oct and 01Nov at Marrakech in Morocco.
This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18–19, 2025.
This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18–19, 2025.
In an era marked by escalating global crises—climate change, cyber threats, pandemics, and nuclear weapons proliferation—this book introduces a science-based approach to security and global threats.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
This book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024.
This book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024.
This book highlights a collection of state-of-the-art research on Safe Artificial General Intelligence (AGI), highlighting the crucial role of cybersecurity, smart applications, and sustainable technologies in ensuring a secure AI future.
This book is the 1st volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024.
This book provides a detailed introduction to the mechanism of rockburst in extremely thick coal seam mining and explores the mechanical mechanism on why the critical depth of rockburst in extremely thick coal seam mining is significantly smaller than that in thin to thick coal seams, it also proposes targeted monitoring, warning, and treatment technologies.
This book provides a detailed introduction to the mechanism of rockburst in extremely thick coal seam mining and explores the mechanical mechanism on why the critical depth of rockburst in extremely thick coal seam mining is significantly smaller than that in thin to thick coal seams, it also proposes targeted monitoring, warning, and treatment technologies.
This book provides thoughtful and extensively researched perspectives, to improve understanding of risks and rewards, and to outline strategies for developing and implementing mature information management capabilities focused on core public safety and security outcomes.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers.
The intelligent diagnosis and maintenance of the machine mainly includes condition monitoring, fault diagnosis, performance degradation assessment and remaining useful life prediction, which plays an important role in protecting people's lives and property.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This book presents peer-reviewed articles from the 2nd International Conference on Dam Safety Management and Engineering (ICDSME 2023), organized by the Malaysian National Committee on Large Dams (MYCOLD), Tenaga Nasional Berhad (TNB), Department of Irrigation and Drainage (DID) and Universiti Tenaga Nasional (UNITEN).
This book presents peer-reviewed articles from the 2nd International Conference on Dam Safety Management and Engineering (ICDSME 2023), organized by the Malaysian National Committee on Large Dams (MYCOLD), Tenaga Nasional Berhad (TNB), Department of Irrigation and Drainage (DID) and Universiti Tenaga Nasional (UNITEN).
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
The Water Reactor Fuel Performance Meeting (WRFPM) held in Asia has merged with TopFuel in Europe and LWR Fuel Performance in the United States to form the globally most influential conference in the field of nuclear fuel research.
The Water Reactor Fuel Performance Meeting (WRFPM) held in Asia has merged with TopFuel in Europe and LWR Fuel Performance in the United States to form the globally most influential conference in the field of nuclear fuel research.
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view.
The Russian Invasion of Ukraine and Implications for the Central Region addresses national security threats and strategic opportunities for the United States and its allies in the Middle East and Central Asia following Russia's invasion of Ukraine.
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
The Russian Invasion of Ukraine and Implications for the Central Region addresses national security threats and strategic opportunities for the United States and its allies in the Middle East and Central Asia following Russia's invasion of Ukraine.