This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This book presents peer-reviewed articles from the 2nd International Conference on Dam Safety Management and Engineering (ICDSME 2023), organized by the Malaysian National Committee on Large Dams (MYCOLD), Tenaga Nasional Berhad (TNB), Department of Irrigation and Drainage (DID) and Universiti Tenaga Nasional (UNITEN).
This book presents peer-reviewed articles from the 2nd International Conference on Dam Safety Management and Engineering (ICDSME 2023), organized by the Malaysian National Committee on Large Dams (MYCOLD), Tenaga Nasional Berhad (TNB), Department of Irrigation and Drainage (DID) and Universiti Tenaga Nasional (UNITEN).
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
The Water Reactor Fuel Performance Meeting (WRFPM) held in Asia has merged with TopFuel in Europe and LWR Fuel Performance in the United States to form the globally most influential conference in the field of nuclear fuel research.
The Water Reactor Fuel Performance Meeting (WRFPM) held in Asia has merged with TopFuel in Europe and LWR Fuel Performance in the United States to form the globally most influential conference in the field of nuclear fuel research.
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view.
The Russian Invasion of Ukraine and Implications for the Central Region addresses national security threats and strategic opportunities for the United States and its allies in the Middle East and Central Asia following Russia's invasion of Ukraine.
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
The Russian Invasion of Ukraine and Implications for the Central Region addresses national security threats and strategic opportunities for the United States and its allies in the Middle East and Central Asia following Russia's invasion of Ukraine.
This book provides thoughtful and extensively researched perspectives, to improve understanding of risks and rewards, and to outline strategies for developing and implementing mature information management capabilities focused on core public safety and security outcomes.
"e;This is the second in a series of three volumes of proceedings of the 23rd Pacific Basin Nuclear Conference (PBNC 2022) which was held by Chinese Nuclear Society.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.
This book is a compilation of selected papers from the 3rd International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plants, held in Harbin, China on 15th-17th August 2018.
This book proposes a framework and strategies for reliable end-to-end post-disaster services using smartphone-based delay-tolerant networks, which can operate even in the absence of conventional network connectivity.
This book discusses various challenges and solutions in the fields of operation, control, design, monitoring and protection of microgrids, and facilitates the integration of renewable energy and distribution systems through localization of generation, storage and consumption.
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective.
This book provides a comprehensive content for professionals engaged in the development of flight safety regulatory framework, as well as in the design and operation of ground-based or on-board flight support radio electronic systems.
This book gathers selected papers from the Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in Chengdu, China on August 23-25, 2017.
This is the third in a series of three volumes of proceedings of the 23rd Pacific Basin Nuclear Conference (PBNC 2022) which was held by Chinese Nuclear Society.
The volume contains 75 papers presented at International Conference on Communication and Networks (COMNET 2015) held during February 19-20, 2016 at Ahmedabad Management Association (AMA), Ahmedabad, India and organized by Computer Society of India (CSI), Ahmedabad Chapter, Division IV and Association of Computing Machinery (ACM), Ahmedabad Chapter.
This book presents methods and algorithms to improve noise immunity of the navigation systems of civil aviation aircraft, operating on the basis of satellite radio navigation systems, as well as improving the quality of the transmission of navigation information by selecting a rational communication resource.
This book presents select peer-reviewed papers presented at the International Conference on Numerical Optimization in Engineering and Sciences (NOIEAS) 2019.
This book highlights operation principles for Air Traffic Control Automated Systems (ATCAS), new scientific directions in design and application of dispatching training simulators and parameters of ATCAS radio equipment items for aircraft positioning.
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately.
This book is a compilation of selected papers from the Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in October 2021 in Zhuji, Zhejiang, China.
This book describes a new control design technique called Coefficient Diagram Method (CDM), whereby practical control engineers without deep control theories and mathematics background can design a good controller for their specific plants.
This book describes principles, industry practices and evolutionary methodologies for advanced safety studies, which are helpful in effectively managing volatile, uncertain, complex, and ambiguous (VUCA) environments within the framework of quantitative risk assessment and management and associated with the safety and resilience of structures and infrastructures with tolerance against various types of extreme conditions and accidents such as fires, explosions, collisions and grounding.