Search
Search Results
-
Internet of Things – ICIOT 2023 8th International Conference, Held as Part of the Services Conference Federation, SCF 2023, Shenzhen, China, December 17–18, 2023, Proceedings
This book constitutes the refereed proceedings of the 8th International Conference on Internet on Things, ICIOT 2023, held as part of SCF 2023,...
-
Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part IV
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...
-
Building Cybersecurity Applications with Blockchain and Smart Contracts
This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the field of cybersecurity. It begins by...
-
Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS... -
Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS... -
Cyber Resilience Fundamentals
This book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT services. Upon introducing the...
-
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of...
-
The Curious Case of Usable Privacy Challenges, Solutions, and Prospects
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a... -
Generative AI Security Theories and Practices
This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines...
-
Data-Centric Security in Software Defined Networks (SDN)
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to...
-
Cyber Malware Offensive and Defensive Systems
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers... -
Securing the Future Introduction to Zero Trust in Cybersecurity
This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm...
-
Digital Transformation, Cyber Security and Resilience Second International Conference, DIGILIENCE 2020, Varna, Bulgaria, September 30 – October 2, 2020, Revised Selected Papers
This volume constitutes revised and selected papers presented at the First International Conference on Digital Transformation, Cyber Security and... -
The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age
The Art of Cyber Warfareexplores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts... -
Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even... -
Proceedings of Data Analytics and Management ICDAM 2023, Volume 1
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held... -
Parallel and Distributed Computing, Applications and Technologies Proceedings of PDCAT 2023
This book constitutes the refereed proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies...
-
ICT: Innovation and Computing Proceedings of ICTCS 2023, Volume 5
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology...
-
Fragile Computing How to Live With Insecure Technologies
This book proposes alternative ways to engage with computer security, rooted in Science and Technology Studies (STS) and extensive ethnographic...
-
Cyber Security and Digital Forensics Select Proceedings of the International Conference, ReDCySec 2023
The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber...