We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 4,971 results
  1. Advances in Multimodal Information Retrieval and Generation

    This book provides an extensive examination of state-of-the-art methods in multimodal retrieval, generation, and the pioneering field of...

    Man Luo, Tejas Gokhale, ... Chitta Baral in Synthesis Lectures on Computer Vision
    Book 2025
  2. Modern Approaches in IoT and Machine Learning for Cyber Security Latest Trends in AI

    This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must...

    Vinit Kumar Gunjan, Mohd Dilshad Ansari, ... ThiDieuLinh Nguyen in Internet of Things
    Book 2024
  3. Segmentation of the Aorta. Towards the Automatic Segmentation, Modeling, and Meshing of the Aortic Vessel Tree from Multicenter Acquisition First Challenge, SEG.A. 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Proceedings

    This book constitutes the First Segmentation of the Aorta Challenge, SEG.A. 2023, which was held in conjunction with the 26th International...
    Antonio Pepe, Gian Marco Melito, Jan Egger in Lecture Notes in Computer Science
    Conference proceedings 2024
  4. Selected Areas in Cryptography – SAC 2023 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers

    This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton,...
    Claude Carlet, Kalikinkar Mandal, Vincent Rijmen in Lecture Notes in Computer Science
    Conference proceedings 2024
  5. Advanced Techniques of Artificial Intelligence in IT Security Systems

    The book explores how modern technologies, including artificial intelligence and neural networks, are being used to enhance cybersecurity. In today's...

    Marcin Korytkowski in Studies in Big Data
    Book 2024
  6. Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II

    This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction...

    Sokratis Katsikas, Habtamu Abie, ... Naoto Yanai in Lecture Notes in Computer Science
    Conference proceedings 2024
  7. Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I

    This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction...

    Sokratis Katsikas, Frédéric Cuppens, ... Stefanos Gritzalis in Lecture Notes in Computer Science
    Conference proceedings 2024
  8. Innovative Security Solutions for Information Technology and Communications 16th International Conference, SecITC 2023, Bucharest, Romania, November 23–24, 2023, Revised Selected Papers

    This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative...

    Mark Manulis, Diana Maimuţ, George Teşeleanu in Lecture Notes in Computer Science
    Conference proceedings 2024
  9. 6GN for Future Wireless Networks 6th EAI International Conference, 6GN 2023, Shanghai, China, October 7-8, 2023, Proceedings, Part II

    This 2-volume set constitutes the proceedings of the 6th EAI International Conference on 6GN for Future Wireless Networks, 6GN 2023, held in...

    Conference proceedings 2024
  10. Fundamentals of Digital Forensics A Guide to Theory, Research and Applications

    This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police...

    Joakim Kävrestad, Marcus Birath, Nathan Clarke in Texts in Computer Science
    Textbook 2024
  11. Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings

    This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16–17, 2023.

    The 18 full...

    Lothar Fritsch, Ismail Hassan, Ebenezer Paintsil in Lecture Notes in Computer Science
    Conference proceedings 2024
  12. Financial Cryptography and Data Security 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I

    The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data...
    Foteini Baldimtsi, Christian Cachin in Lecture Notes in Computer Science
    Conference proceedings 2024
  13. Guide to Computer Network Security

    This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the...

    Joseph Migga Kizza in Texts in Computer Science
    Textbook 2024
  14. Critical Infrastructure Protection in the Light of the Armed Conflicts

    This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflicts and wars are now closer to...

    Tünde Anna Kovács, Zoltán Nyikes, ... László Tóth in Advanced Sciences and Technologies for Security Applications
    Conference proceedings 2024
  15. Computing and Combinatorics 29th International Conference, COCOON 2023, Hawaii, HI, USA, December 15–17, 2023, Proceedings, Part II

    This two volume set volume LNCS 14422-14423 constitutes the refereed proceedings of the 29th International Conference, COCOON 2023, held in Hawaii,...

    Weili Wu, Guangmo Tong in Lecture Notes in Computer Science
    Conference proceedings 2024
  16. Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research

    This book explores the connections between qualitative data reuse, big social research, and data curation. A review of existing literature identifies...
    Book 2024
  17. Information Security Planning A Practical Approach

    This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the...

    Susan Lincke
    Book 2024
  18. Handbook of Face Recognition

    The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition – a task that humans perform...

    Stan Z. Li, Anil K. Jain, Jiankang Deng
    Book 2024
  19. Legal Developments on Cybersecurity and Related Fields

    This book presents a fresh approach to cybersecurity issues, seeking not only to analyze the legal landscape of the European Union and its Member...
    Francisco António Carneiro Pacheco de Andrade, Pedro Miguel Fernandes Freitas, Joana Rita de Sousa Covelo de Abreu in Law, Governance and Technology Series
    Book 2024
  20. Image Watermarking Techniques

    This book investigates the image watermarking domain, analyzing and comparing image watermarking techniques that exist in current literature. The...

    Book 2024
Did you find what you were looking for? Share feedback.