Computer Science (R0)
High Performance Computing. ISC High Performance 2024 International Workshops
Chronologie aller Bände (1 - 40)

Die Reihenfolge beginnt mit dem eBook "Guide to Cisco Routers Configuration". Wer alle eBookz der Reihe nach lesen möchte, sollte mit diesem Band von Markus Helfert beginnen. Der zweite Teil der Reihe "Critical Information Infrastructures Security" ist am 01.01.2022 erschienen. Mit insgesamt 40 Bänden wurde die Reihe über einen Zeitraum von ungefähr 10 Jahren fortgesetzt. Der neueste Band trägt den Titel "GenAI and LLMs for Beyond 5G Networks".
- Anzahl der Bewertungen für die gesamte Reihe: 1
- Ø Bewertung der Reihe: 4
- Start der Reihe: 26.12.2015
- Neueste Folge: 15.12.2025
Diese Reihenfolge enthält 36 unterschiedliche Autoren.
- Autor: Alani, Mohammed M.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 09.05.2017
- Genre: Sonstiges
Guide to Cisco Routers Configuration
This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios. Features: discusses basic configuration, domestic duties, standard and advanced routing, WANtechnologies, security, router management, remote connectivity, and practical tips; explains in detail the steps required to configure different protocols on Cisco routers; includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW); provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW).
- Autor: Hargood, Charlie
- Anzahl Bewertungen: 1
- Ø Bewertung: 4.0
- Medium: E-Book
- Veröffentlicht: 02.02.2023
- Genre: Sachbuch
The Authoring Problem
Authoring, its tools, processes, and design challenges are key issues for the Interactive Digital Narrative (IDN) research community. The complexity of IDN authoring, often involving stories co-created by procedures and user interaction, creates confusion for tool developers and raises barriers for new authors.
This book examines these issues from both the tool designer and the author’s perspective, discusses the poetics of IDN and how that can be used to design authoring tools, explores diverse forms of IDN and their demands, and investigates the challenges around conducting research on IDN authoring.
To address these challenges, the chapter authors incorporate a range of interdisciplinary perspectives on ‘The Authoring Problem’ in IDN. While existing texts provide ‘how-to’ guidance for authors, this book is a primer for research and practice-based investigations into the authoring problem, collecting the latest thoughts about this area from key researchers and practitioners.- Autor: Juan Ferrer, Ana
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 05.03.2023
- Genre: Sachbuch
Beyond Edge Computing
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling the basis for Advanced Swarm Computing developments. It features the Swarm computing concepts and realizes it as an Ad-hoc Edge Cloud architecture.
Unlike current techniques in Edge and Cloud computing that solely view IoT connected devices as sources of data, Swarm computing aims at using the compute capabilities of IoT connected devices in coordination with current Edge and Cloud computing innovations. In addition to being more widely available, IoT-connected devices are also quickly becoming more sophisticated in terms of their ability to carry considerable compute and storage resources. Swarm computing and Ad-hoc Edge Cloud take full advantage of this trend to create on-demand, autonomic and decentralized self-managed computing infrastructures.Focusing on cognitive resource and service management, the book examines the specific research challenges of the Swarm computing approach, related to the characteristics of IoT connected devices that form the infrastructure. It also offers academics and practitioners insights for future research in the fields of Edge and Swarm computing.
- Autor: Pavlovic, Dusko
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 19.09.2023
- Genre: Sonstiges
Programs as Diagrams
It is not always clear what computer programs mean in the various languages in which they can be written, yet a picture can be worth 1000 words, a diagram 1000 instructions.
In this unique textbook/reference, programs are drawn as string diagrams in the language of categories, which display a universal syntax of mathematics (Computer scientists use them to analyze the program semantics; programmers to display the syntax of computations). Here, the string-diagrammatic depictions of computations are construed as programs in a single-instruction programming language. Such programs as diagrams show how functions are packed in boxes and tied by strings. Readers familiar with categories will learn about the foundations of computability; readers familiar with computability gain access to category theory. Additionally, readers familiar with both are offered many opportunities to improve the approach.
Topics and features:
- Delivers a ‘crash’ diagram-based course in theory of computation
- Uses single-instruction diagrammatic programming language
- Offers a practical introduction into categories and string diagrams as computational tools
- Reveals how computability is programmability, rather than an ‘ether’ permeating computers
- Provides a categorical model of intensional computation is unique up to isomorphism
- Serves as a stepping stone into research of computable categories
In addition to its early chapters introducing computability for beginners, this flexible textbook/resource also contains both middle chapters that expand for suitability to a graduate course as well as final chapters opening up new research.
Dusko Pavlovic is a professor at the Department of Information and Computer Sciences at the University of Hawaii at Manoa, and by courtesy at the Department of Mathematics and the College of Engineering. He completed this book as an Excellence Professor at Radboud University in Nijmegen, The Netherlands.
- Autor: De Marsico, Maria
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 21.02.2024
- Genre: Sonstiges
Pattern Recognition Applications and Methods
This book constitutes the thoroughly refereed and revised selected papers from the 12th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2023, held in Lisbon, Portugal, during February 22–24, 2023.
The 28 full papers and 42 short papers included in this book were carefully reviewed and selected from 157 submissions. They were organized in topical sections as follows: theory and methods and applications.
- Autor: Alonso-Betanzos, Amparo
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 11.06.2024
- Genre: Sonstiges
Advances in Artificial Intelligence
This book constitutes the refereed proceedings of the 20th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2024, held in A Coruña, Spain, during June 19–21, 2024.
The 27 full papers presented in this book were carefully reviewed and selected from 38 submissions.
CAEPIA is a forum open to researchers from all over the world to present and discuss their latest scientific and technological advances in Artificial Intelligence (AI).
The papers cover such themes as: machine learning, search and optimization, creativity and AI, ontologies and knowledge graphs, education and AI, foundation, models and applications of AI, uncertainty in AI, ambient intelligence and smart environments, explainable and responsible AI, fuzzy logic, natural language processing, knowledge representation, reasoning and logic, constraints, search and planning, multi-agent systems, computer vision and robotics, and intelligent web and information retrieval.
- Autor: Julian, Vicente
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 19.11.2024
- Genre: Sonstiges
Intelligent Data Engineering and Automated Learning – IDEAL 2024
This two-volume set, LNCS 15346 and LNCS 15347, constitutes the proceedings of the 25th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2024, held in Valencia, Spain, during November 20–22, 2024.
The 86 full papers and 6 short papers presented in this book were carefully reviewed and selected from 130 submissions. IDEAL 2024 is focusing on Big Data Analytics and Privacy, Machine Learning & Deep Learning for Real-World Applications, Data Mining and Pattern Recognition, Information Retrieval and Management, Bio and Neuro-Informatics, and Hybrid Intelligent Systems and Agents.
- Autor: Menéndez, Héctor D.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 24.01.2025
- Genre: Sonstiges
Testing Software and Systems
This book constitutes the refereed proceedings of the 36th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2024, held in London, UK, during October 30–November 1, 2024.
The 17 full papers and 5 short papers included in this book were carefully reviewed and selected from 40 submissions. They were organized in topical sections as follows: Best Paper Award; Industry and Challenge Tracks; Mutation Testing and Code Generation; Advancing Code Vulnerability Detection; Short Papers; Tutorial; Journal First; Health Track; Innovations in Software Testing and AI Compliance; Improving Software Testing Reliability and Advancements in Testing Methodologies.
- Autor: Juan, Angel A.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 28.04.2025
- Genre: Sonstiges
Simulation Tools and Techniques
This book constitutes the refereed post-conference proceedings of the 16th EAI International Conference on Simulation Tools and Techniques, SIMUTools 2024, held in Bratislava, Slovakia, in December 2024.
The 26 full papers included in this book were carefully reviewed and selected from 63 submissions. They were organized in topical sections as follows: simulation tools and methods, traffic simulations, logistics and manufacturing, robotics simulations, applications of simulations, and network simulations.
- Autor: Jager, Tibor
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 07.05.2025
- Genre: Sonstiges
Public-Key Cryptography – PKC 2025
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.
The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
- Autor: Jager, Tibor
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 07.05.2025
- Genre: Sonstiges
Public-Key Cryptography – PKC 2025
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.
The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
- Autor: Lossio-Ventura, Juan Antonio
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 17.05.2025
- Genre: Sonstiges
Information Management and Big Data
This book constitutes the proceedings of the 11th Annual International Conference on Information Management and Big Data, SIMBig 2024, held in Ilo, Peru, during November 20–22, 2024.
The 27 full papers and 1 short paper included in this book were carefully reviewed and selected from 102 submissions. They were organized in topical sections as follows: machine learning and deep learning; natural language processing; mining of social networks and online platforms; and signal and image processing.
- Autor: Adi, Kamel
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 29.05.2025
- Genre: Krimi
Foundations and Practice of Security
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09–11, 2024.
The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections:
Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical
infrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.
- Autor: Caino-Lores, Silvina
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 09.06.2025
- Genre: Sonstiges
Euro-Par 2024: Parallel Processing Workshops
The two-volume set LNCS 15385 + 15386 constitutes the proceedings of the workshops and associated events that were held in conjunction with the 30th European Conference on Parallel and Distributed Processing, Euro-Par 2024, which took place in Madrid, Spain, during August 26–30, 2024.
Overall, the Euro-Par Workshops received a total of 84 submissions of which 60 were accepted for presentation. They stem from the following workshops:
– The 1st European Workshop on Quantum Computing for High-Performance Computing (EUROQHPC 2024)
– The 19th Workshop on Virtualization in High-Performance Cloud Computing (VHPC 2024)
– The 1st Workshop in High-Performance Computing in Physics (PHYSHPC 2024)
– The 4th Workshop on Asynchronous Many-Task Systems for Exascale (AMTE 2024)
– The 3rd EuroHPC Workshop on Dynamic Resources in HPC (DYNRESHPC 2024)
– The 22nd International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HETEROPAR 2024)
– The 1st Workshop on Next Steps in IoT-Edge-Cloud Continuum Evolution: Research and Practice (IECCONT 2024)
– The 1st Workshop about High-Performance e-Science (HIPES 2024)
– The 2nd International Workshop on Scalable Compute Continuum (WSCC 2024)
In addition, the proceedings contain 14 poster and demo papers that have been accepted from 30 submissions, and 18 contributions in the PhD Symposium track that were accepted from 22 submissions.
- Autor: Caino-Lores, Silvina
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 10.06.2025
- Genre: Sonstiges
Euro-Par 2024: Parallel Processing Workshops
The two-volume set LNCS 15385 + 15386 constitutes the proceedings of the workshops and associated events that were held in conjunction with the 30th European Conference on Parallel and Distributed Processing, Euro-Par 2024, which took place in Madrid, Spain, during August 26–30, 2024.
Overall, the Euro-Par Workshops received a total of 84 submissions of which 60 were accepted for presentation. They stem from the following workshops:
– The 1st European Workshop on Quantum Computing for High-Performance Computing (EUROQHPC 2024)
– The 19th Workshop on Virtualization in High-Performance Cloud Computing (VHPC 2024)
– The 1st Workshop in High-Performance Computing in Physics (PHYSHPC 2024)
– The 4th Workshop on Asynchronous Many-Task Systems for Exascale (AMTE 2024)
– The 3rd EuroHPC Workshop on Dynamic Resources in HPC (DYNRESHPC 2024)
– The 22nd International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HETEROPAR 2024)
– The 1st Workshop on Next Steps in IoT-Edge-Cloud Continuum Evolution: Research and Practice (IECCONT 2024)
– The 1st Workshop about High-Performance e-Science (HIPES 2024)
– The 2nd International Workshop on Scalable Compute Continuum (WSCC 2024)
In addition, the proceedings contain 14 poster and demo papers that have been accepted from 30 submissions, and 18 contributions in the PhD Symposium track that were accepted from 22 submissions.
- Autor: Egele, Manuel
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 09.07.2025
- Genre: Krimi
Detection of Intrusions and Malware, and Vulnerability Assessment
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.
The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections:
Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation.
Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
- Autor: Drevin, Lynette
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 25.07.2025
- Genre: Krimi
Information Security Education. Empowering People Through Information Security Education
This book constitutes the refereed proceedings of the 17th IFIP WG 11.8 World Conference on Information Security Education, WISE 2025, held in Maribor, Slovenia, during May 21–23, 2025.
The 13 full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in the following topical sections: Workforce and Curriculum Development; Curriculum and Research Development; Gamification in Cybersecurity Education; Innovative Approaches to Cybersecurity Awareness; Papers Invited from SEC; and Discussions.
- Autor: Mercier-Laurent, Eunika
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 30.09.2025
- Genre: Sonstiges
Computational Intelligence in Data Science
The three-volume set IFIP ICCIDS 748, 749 and 750 constitutes the refereed post-conference proceedings of the 8th IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2025, held in Chennai, India, during February 12–14, 2025.
The 91 papers including 70 regular papers and 21 short papers included in these proceedings were carefully reviewed and selected from 317 submissions. The papers are organized in the following topical sections:
Part I: Computer Vision for Real World Applications.
Part II: Computer Vision for Real World Applications; Emerging Trends in AI for Speech and Text.
Part III: Emerging Trends in AI for Speech and Text; Computational Intelligence for Secure, Smart and Sustainable Applications
- Autor: Singh, Sukhdeep
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 15.12.2025
- Genre: Sonstiges
GenAI and LLMs for Beyond 5G Networks
Beyond 5G and 6G Networks, the AI-Native Revolution explores the transformative convergence of generative artificial intelligence (GenAI), large language models (LLMs), and next-generation telecommunications. This book delves into the architectural innovations enabling AI-driven connectivity, from intelligent edge devices to adaptive radio access networks. It covers the integration of GenAI for real-time network optimization, generative modeling of wireless channels, and advanced analytics for actionable insights. Security frameworks for AI-native systems, orchestration of autonomous networks, and the fusion of AI with signal processing are thoroughly examined, offering practical solutions for researchers, engineers, and policymakers.
The book also addresses the challenges of computational constraints, ethical dilemmas, and regulatory complexities in deploying AI-driven networks. It provides a technical yet accessible roadmap for building equitable, trustworthy, and efficient systems, balancing innovation with responsibility. With insights grounded in rigorous research and real-world applications, this work is a guide for students, practitioners, and visionaries shaping the future of connectivity. It invites readers to reimagine networks as intelligent ecosystems that anticipate needs and empower humanity’s highest aspirations.
- Band: 441
- Autor: Gladyshev, Pavel
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 03.06.2022
- Genre: Krimi
Digital Forensics and Cyber Crime
The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.
- Band: 570
- Autor: Goel, Sanjay
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 02.04.2024
- Genre: Krimi
Digital Forensics and Cyber Crime
The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:
Volume I:
Crime profile analysis and Fact checking, Information hiding and Machine learning.
Volume II:
Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
- Band: 578
- Autor: Helfert, Markus
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 26.12.2015
- Genre: Sonstiges
Information and Communication Technologies for Ageing Well and e-Health
This book constitutes the thoroughly refereedproceedings of the International Conference on Communication Technologies forAgeing Well and e-Health, ICT4AgeingWell 2015, held in Lisbon, Portugal, in May2015.
The 11 full papers and two invited papers presented were carefully reviewed andselected from 45 submissions. The papers cover five main topic areas, covering different aspects, including Ambient AssistedLiving, Telemedicine and E-Health, Monitoring, Accessibility and UserInterfaces, Robotics and Devices for Independent Living and HCI for Ageing Populations.
- Band: 648
- Autor: Meng, Weizhi
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 03.06.2022
- Genre: Krimi
ICT Systems Security and Privacy Protection
- Band: 666
- Autor: Staggs, Jason
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 29.11.2022
- Genre: Krimi
Critical Infrastructure Protection XVI
Critical Infrastructure Protection XVI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Industrial Control Systems Security; Telecommunications Systems Security; Infrastructure Security.
This book is the 16th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
The book contains a selection of 11 edited papers from the Fifteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held as a virtual event during March, 2022.
Critical Infrastructure Protection XVI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
- Band: 1524
- Autor: Kamp, Michael
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 17.02.2022
- Genre: Kinderbuch
Machine Learning and Principles and Practice of Knowledge Discovery in Databases
- Band: 1621
- Autor: Vallecillo, Antonio
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 05.09.2022
- Genre: Krimi
Quality of Information and Communications Technology
The 18 full papers and 3 short papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections: smart and advanced systems; verification and validation; skills and education; industrial experiences and applications; safety, security and privacy.
- Band: 1683
- Autor: Bathen, Luis
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 18.01.2023
- Genre: Krimi
Silicon Valley Cybersecurity Conference
The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment.
This is an open access book.
- Band: 13041
- Autor: Yang, Min
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 04.01.2022
- Genre: Krimi
Network and System Security
This book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021.
The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
- Band: 13049
- Autor: Batina, Lejla
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 07.04.2022
- Genre: Krimi
Security and Artificial Intelligence
The editors of this State-of-the-Art Survey invited a cross-disciplinary team of researchers to a Lorentz workshop in 2019 to improve collaboration in these areas. Some contributions were initiated at the event, others were developed since through further invitations, editing, and cross-reviewing. This contributed book contains 14 invited chapters that address side-channel attacks and fault injection, cryptographic primitives, adversarial machine learning, and intrusion detection. The chapters were evaluated based on their significance, technical quality, and relevance to the topics of security and AI, and each submission was reviewed in single-blindmode and revised.
- Band: 13139
- Autor: Percia David, Dimitri
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 01.01.2022
- Genre: Krimi
Critical Information Infrastructures Security
The 12 full papers included in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services.
- Band: 13285
- Autor: Zhou, Jianying
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.09.2022
- Genre: Krimi
Applied Cryptography and Network Security Workshops
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event.
The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops:
– AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security– AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security
– AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security
– CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security
– Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy
– SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation– SecMT: 3rd ACNS Workshop on Security in Mobile Technologies
– SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications
- Band: 13291
- Autor: Aïmeur, Esma
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 14.06.2022
- Genre: Krimi
Foundations and Practice of Security
This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021.
The 18 full papers and 9 short paper presented in this book were carefully reviewed and selected from 62 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design.
Chapters “A Quantile-based Watermarking Approach for Distortion Minimization”, “Choosing Wordlists for Password Guessing: An Adaptive Multi-Armed Bandit Approach” and “A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
- Band: 13632
- Autor: Wong, Lung-Hsiang
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 22.10.2022
- Genre: Sonstiges
Collaboration Technologies and Social Computing
The 18 full and 4 work-in-process papers presented in this volume were selected from 37 submissions and underwent careful double-blind peer review. The papers focus on innovative technical, human and organizational approaches to expand collaboration support including computer science, management science, design science, cognitive and social science.
- Band: 13745
- Autor: Li, Wenjuan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 10.12.2022
- Genre: Krimi
Attacks and Defenses for the Internet-of-Things
The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions.
This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.- Band: 13877
- Autor: Jourdan, Guy-Vincent
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 31.03.2023
- Genre: Krimi
Foundations and Practice of Security
The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
- Band: 13907
- Autor: Zhou, Jianying
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 03.10.2023
- Genre: Krimi
Applied Cryptography and Network Security Workshops
The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops:
- Band: 13942
- Autor: Atluri, Vijayalakshmi
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 11.07.2023
- Genre: Krimi
Data and Applications Security and Privacy XXXVII
The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications.
- Band: 14496
- Autor: Sheng, Bin
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 28.12.2023
- Genre: Sonstiges
Advances in Computer Graphics
The 149 papers in this set were carefully reviewed and selected from 385 submissions. They are organized in topical sections as follows: Detection and Recognition; Image Analysis and Processing; Image Restoration and Enhancement; Image Attention and Perception; Reconstruction; Rendering and Animation; Synthesis and Generation; Visual Analytics and Modeling; Graphics and AR/VR; Medical Imaging and Robotics; Theoretical Analysis; Image Analysis and Visualization in Advanced Medical Imaging Technology; Empowering Novel Geometric Algebra for Graphics and Engineering.
- Band: 14498
- Autor: Sheng, Bin
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.12.2023
- Genre: Sonstiges
Advances in Computer Graphics
The 149 papers in this set were carefully reviewed and selected from 385 submissions. They are organized in topical sections as follows: Detection and Recognition; Image Analysis and Processing; Image Restoration and Enhancement; Image Attention and Perception; Reconstruction; Rendering and Animation; Synthesis and Generation; Visual Analytics and Modeling; Graphics and AR/VR; Medical Imaging and Robotics; Theoretical Analysis; Image Analysis and Visualization in Advanced Medical Imaging Technology; Empowering Novel Geometric Algebra for Graphics and Engineering.
- Band: 15181
- Autor: Wu, Jia
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 04.10.2024
- Genre: Sonstiges
Computational Mathematics Modeling in Cancer Analysis
This book constitutes the refereed proceedings of Third International Workshop on Computational Mathematics Modeling in Cancer Analysis, CMMCA 2024, held in Marrakesh, Morocco, on October 6, 2024, in conjunction with MICCAI 2024.
The 12 full papers presented in this book were carefully reviewed and selected from 14 submissions. CMMCA serves as a platform for collaboration among professionals in mathematics, engineering, computer science, and medicine, focusing on innovative mathematical methods for analyzing complex cancer data.






































