You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
This multi-volume set, LNAI 16013 to LNAI 16022, constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2025, held in Porto, Portugal, September 15–19, 2025. !-- [if !supportLineBreakNewLine]-- !--[endif]-- The 300 full papers presented here, together with 15 demo papers, were carefully reviewed and selected from 1253 submissions. The papers presented in these proceedings are from the following three conference tracks: The Research Track in Volume LNAI 16013-16020 refers about Anomaly & Outlier Detection, Bias & Fairness, Causality, Clustering, Data Challenges, Diffusion Models, Ensemble Learning, Graph Neural Net...
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024. The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on Privacy and Cryptography AI for cybersecurity and Adversial models Quantum Computing in Cybersecurity Network Security Blockchain and Cryptocurrencies Fuzzing and IoT security Malware and Attack Analysis Web Security Authentication Large Language Model for Cybersecurity Security Assessments
Informative reference on the state of the art in cybersecurity and how to achieve a more secure cyberspace AI for Cybersecurity presents the state of the art and practice in AI for cybersecurity with a focus on four interrelated defensive capabilities of deter, protect, detect, and respond. The book examines the fundamentals of AI for cybersecurity as a multidisciplinary subject, describes how to design, build, and operate AI technologies and strategies to achieve a more secure cyberspace, and provides why-what-how of each AI technique-cybersecurity task pair to enable researchers and practitioners to make contributions to the field of AI for cybersecurity. This book is aligned with the Nati...
The first chapter of this title concerns virtualization techniques that allow sharing computational resources basically, slicing a real computational environment into virtual computational environments that are isolated from one another. The Xen and OpenFlow virtualization platforms are then presented in Chapter 2 and a performance analysis of both is provided. This chapter also defines the primitives that the network virtualization infrastructure must provide for allowing the piloting plane to manage virtual network elements. Following this, interfaces for system management of the two platforms are proposed in Chapter 3. To control and manage virtual network elements, five primitives that t...
6G Wireless: The Communication Paradigm Beyond 2030 offers a thorough discussion of some key emerging technologies such as Intelligent Reflecting Surface (IRS), Unmanned Aerial Vehicles (UAV), Aerial Computing, Terahertz (THz) Communications, Non-Orthogonal Multiple Access (NOMA) and Rate Splitting Multiple Access (RSMA). The book provides a comprehensive coverage of the vision, requirements, use cases, enabling technologies, and challenges for the future 6G wireless communication systems. This includes discussions on how 6G and future IoT systems will enable extremely low latency healthcare systems, smart industry, haptic communications, programmable wireless environment (PWE), advanced VR/...
None
None