We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 353 results
  1. AI-Driven Cybersecurity and Threat Intelligence Cyber Automation, Intelligent Decision-Making and Explainability

    This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as...
    Iqbal H. Sarker
    Book 2024
  2. Human-Centric Smart Computing Proceedings of ICHCSC 2023

    This book includes high-quality research papers presented at the Second International Conference on Human-Centric Smart Computing (ICHCSC 2023),...
    Siddhartha Bhattacharyya, Jyoti Sekhar Banerjee, Mario Köppen in Smart Innovation, Systems and Technologies
    Conference proceedings 2024
  3. Frontiers in Cyber Security 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers

    This volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu,...
    Conference proceedings 2024
  4. Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I

    This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference...

    Conference proceedings 2024
  5. Deception in Autonomous Transport Systems Threats, Impacts and Mitigation Policies

    This book provides a comprehensive overview of deception in autonomous transport systems. This involves investigating the threats facing autonomous...
    Simon Parkinson, Alexandros Nikitas, Mauro Vallati in Wireless Networks
    Book 2024
  6. Information Security Theory and Practice 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 – March 1, 2024, Proceedings

    This volume constitutes the refereed proceedings of the 14th IFIP WG 11.2 International Conference on Information Security Theory and Practices,...

    Samia Bouzefrane, Damien Sauveron in Lecture Notes in Computer Science
    Conference proceedings 2024
  7. Android Malware Detection and Adversarial Methods

    The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...

    Weina Niu, Xiaosong Zhang, ... Jiacheng Gong
    Book 2024
  8. Information Security Applications 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers

    This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in...
    Howon Kim, Jonghee Youn in Lecture Notes in Computer Science
    Conference proceedings 2024
  9. Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings

    This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16–17, 2023.

    The 18 full...

    Lothar Fritsch, Ismail Hassan, Ebenezer Paintsil in Lecture Notes in Computer Science
    Conference proceedings 2024
  10. Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II

    This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction...

    Sokratis Katsikas, Habtamu Abie, ... Naoto Yanai in Lecture Notes in Computer Science
    Conference proceedings 2024
  11. Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II

    The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and...
    Chunpeng Ge, Moti Yung in Lecture Notes in Computer Science
    Conference proceedings 2024
  12. Innovative Security Solutions for Information Technology and Communications 16th International Conference, SecITC 2023, Bucharest, Romania, November 23–24, 2023, Revised Selected Papers

    This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative...

    Mark Manulis, Diana Maimuţ, George Teşeleanu in Lecture Notes in Computer Science
    Conference proceedings 2024
  13. Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I

    This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction...

    Sokratis Katsikas, Frédéric Cuppens, ... Stefanos Gritzalis in Lecture Notes in Computer Science
    Conference proceedings 2024
  14. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  15. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
  16. Blockchains A Handbook on Fundamentals, Platforms and Applications

    This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The...
    Sushmita Ruj, Salil S. Kanhere, Mauro Conti in Advances in Information Security
    Book 2024
  17. Network Analysis and Architecture

    This book covers network analysis and architecture for large-scale computer network planning. Networks and the Internet are essential for modern...

    Yu-Chu Tian, Jing Gao in Signals and Communication Technology
    Book 2024
  18. CompTIA Linux+ Certification Companion Hands-on Preparation to Master Linux Administration

    The CompTIA Linux+ Certification" book – the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+...

    Book 2024
  19. Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part I

    The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and...
    Chunpeng Ge, Moti Yung in Lecture Notes in Computer Science
    Conference proceedings 2024
  20. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part III

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
Did you find what you were looking for? Share feedback.