Search
Search Results
-
AI-Driven Cybersecurity and Threat Intelligence Cyber Automation, Intelligent Decision-Making and Explainability
This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as... -
Human-Centric Smart Computing Proceedings of ICHCSC 2023
This book includes high-quality research papers presented at the Second International Conference on Human-Centric Smart Computing (ICHCSC 2023),... -
Frontiers in Cyber Security 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers
This volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu,... -
Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I
This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference...
-
Deception in Autonomous Transport Systems Threats, Impacts and Mitigation Policies
This book provides a comprehensive overview of deception in autonomous transport systems. This involves investigating the threats facing autonomous... -
Information Security Theory and Practice 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 – March 1, 2024, Proceedings
This volume constitutes the refereed proceedings of the 14th IFIP WG 11.2 International Conference on Information Security Theory and Practices,...
-
Android Malware Detection and Adversarial Methods
The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...
-
Information Security Applications 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers
This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in... -
Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings
This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16–17, 2023.
The 18 full...
-
Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction...
-
Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and... -
Innovative Security Solutions for Information Technology and Communications 16th International Conference, SecITC 2023, Bucharest, Romania, November 23–24, 2023, Revised Selected Papers
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative...
-
Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction...
-
Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...
-
Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...
-
Blockchains A Handbook on Fundamentals, Platforms and Applications
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The... -
Network Analysis and Architecture
This book covers network analysis and architecture for large-scale computer network planning. Networks and the Internet are essential for modern...
-
CompTIA Linux+ Certification Companion Hands-on Preparation to Master Linux Administration
The CompTIA Linux+ Certification" book – the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+...
-
Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part I
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and... -
Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part III
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...