Computer Science (R0)

High Performance Computing. ISC High Performance 2024 International Workshops

Chronologie aller Bände (1 - 40)

Reihe: Computer Science (R0)

Die Reihenfolge beginnt mit dem eBook "Guide to Cisco Routers Configuration". Wer alle eBookz der Reihe nach lesen möchte, sollte mit diesem Band von Markus Helfert beginnen. Der zweite Teil der Reihe "Critical Information Infrastructures Security" ist am 01.01.2022 erschienen. Mit insgesamt 40 Bänden wurde die Reihe über einen Zeitraum von ungefähr 10 Jahren fortgesetzt. Der neueste Band trägt den Titel "GenAI and LLMs for Beyond 5G Networks".

  • Anzahl der Bewertungen für die gesamte Reihe: 1
  • Ø Bewertung der Reihe: 4
  • Start der Reihe: 26.12.2015
  • Neueste Folge: 15.12.2025

Diese Reihenfolge enthält 36 unterschiedliche Autoren.

Cover: Guide to Cisco Routers Configuration
  • Autor: Alani, Mohammed M.
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 09.05.2017
  • Genre: Sonstiges

Guide to Cisco Routers Configuration

This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios. Features: discusses basic configuration, domestic duties, standard and advanced routing, WANtechnologies, security, router management, remote connectivity, and practical tips; explains in detail the steps required to configure different protocols on Cisco routers; includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW); provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW).

Cover: The Authoring Problem
  • Autor: Hargood, Charlie
  • Anzahl Bewertungen: 1
  • Ø Bewertung: 4.0
  • Medium: E-Book
  • Veröffentlicht: 02.02.2023
  • Genre: Sachbuch

The Authoring Problem

Authoring, its tools, processes, and design challenges are key issues for the Interactive Digital Narrative (IDN) research community. The complexity of IDN authoring, often involving stories co-created by procedures and user interaction, creates confusion for tool developers and raises barriers for new authors.

This book examines these issues from both the tool designer and the author’s perspective, discusses the poetics of IDN and how that can be used to design authoring tools, explores diverse forms of IDN and their demands, and investigates the challenges around conducting research on IDN authoring.

To address these challenges, the chapter authors incorporate a range of interdisciplinary perspectives on ‘The Authoring Problem’ in IDN. While existing texts provide ‘how-to’ guidance for authors, this book is a primer for research and practice-based investigations into the authoring problem, collecting the latest thoughts about this area from key researchers and practitioners.

Cover: Beyond Edge Computing
  • Autor: Juan Ferrer, Ana
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 05.03.2023
  • Genre: Sachbuch

Beyond Edge Computing

This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling the basis for Advanced Swarm Computing developments. It features the Swarm computing concepts and realizes it as an Ad-hoc Edge Cloud architecture.

Unlike current techniques in Edge and Cloud computing that solely view IoT connected devices as sources of data, Swarm computing aims at using the compute capabilities of IoT connected devices in coordination with current Edge and Cloud computing innovations. In addition to being more widely available, IoT-connected devices are also quickly becoming more sophisticated in terms of their ability to carry considerable compute and storage resources. Swarm computing and Ad-hoc Edge Cloud take full advantage of this trend to create on-demand, autonomic and decentralized self-managed computing infrastructures.
Focusing on cognitive resource and service management, the book examines the specific research challenges of the Swarm computing approach, related to the characteristics of IoT connected devices that form the infrastructure. It also offers academics and practitioners insights for future research in the fields of Edge and Swarm computing.


Cover: Programs as Diagrams
  • Autor: Pavlovic, Dusko
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 19.09.2023
  • Genre: Sonstiges

Programs as Diagrams

It is not always clear what computer programs mean in the various languages in which they can be written, yet a picture can be worth 1000 words, a diagram 1000 instructions.

In this unique textbook/reference, programs are drawn as string diagrams in the language of categories, which display a universal syntax of mathematics (Computer scientists use them to analyze the program semantics; programmers to display the syntax of computations). Here, the string-diagrammatic depictions of computations are construed as programs in a single-instruction programming language.  Such programs as diagrams show how functions are packed in boxes and tied by strings. Readers familiar with categories will learn about the foundations of computability; readers familiar with computability gain access to category theory. Additionally, readers familiar with both are offered many opportunities to improve the approach.

Topics and features:

  • Delivers a ‘crash’ diagram-based course in theory of computation
  • Uses single-instruction diagrammatic programming language
  • Offers a practical introduction into categories and string diagrams as computational tools
  • Reveals how computability is programmability, rather than an ‘ether’ permeating computers
  • Provides a categorical model of intensional computation is unique up to isomorphism
  • Serves as a stepping stone into research of computable categories

In addition to its early chapters introducing computability for beginners, this flexible textbook/resource also contains both middle chapters that expand for suitability to a graduate course as well as final chapters opening up new research.

Dusko Pavlovic is a professor at the Department of Information and Computer Sciences at the University of Hawaii at Manoa, and by courtesy at the Department of Mathematics and the College of Engineering. He completed this book as an Excellence Professor at Radboud University in Nijmegen, The Netherlands.

Cover: Pattern Recognition Applications and Methods
  • Autor: De Marsico, Maria
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 21.02.2024
  • Genre: Sonstiges

Pattern Recognition Applications and Methods

This book constitutes the thoroughly refereed and revised selected papers from the 12th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2023, held in Lisbon, Portugal, during February 22–24, 2023.

The 28 full papers and 42 short papers included in this book were carefully reviewed and selected from 157 submissions. They were organized in topical sections as follows: theory and methods and applications.

Cover: Advances in Artificial Intelligence
  • Autor: Alonso-Betanzos, Amparo
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 11.06.2024
  • Genre: Sonstiges

Advances in Artificial Intelligence

This book constitutes the refereed proceedings of the 20th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2024, held in A Coruña, Spain, during June 19–21, 2024.

The 27 full papers presented in this book were carefully reviewed and selected from 38 submissions.

CAEPIA is a forum open to researchers from all over the world to present and discuss their latest scientific and technological advances in Artificial Intelligence (AI).

The papers cover such themes as: machine learning, search and optimization, creativity and AI, ontologies and knowledge graphs, education and AI, foundation, models and applications of AI, uncertainty in AI, ambient intelligence and smart environments, explainable and responsible AI, fuzzy logic, natural language processing, knowledge representation, reasoning and logic, constraints, search and planning, multi-agent systems, computer vision and robotics, and intelligent web and information retrieval.

Cover: Intelligent Data Engineering and Automated Learning – IDEAL 2024
  • Autor: Julian, Vicente
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 19.11.2024
  • Genre: Sonstiges

Intelligent Data Engineering and Automated Learning – IDEAL 2024

This two-volume set, LNCS 15346 and LNCS 15347, constitutes the proceedings of the 25th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2024, held in Valencia, Spain, during November 20–22, 2024. 

The 86 full papers and 6 short papers presented in this book were carefully reviewed and selected from 130 submissions. IDEAL 2024 is focusing on Big Data Analytics and Privacy, Machine Learning & Deep Learning for Real-World Applications, Data Mining and Pattern Recognition, Information Retrieval and Management, Bio and Neuro-Informatics, and Hybrid Intelligent Systems and Agents.

Cover: Testing Software and Systems
  • Autor: Menéndez, Héctor D.
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 24.01.2025
  • Genre: Sonstiges

Testing Software and Systems

This book constitutes the refereed proceedings of the 36th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2024, held in London, UK, during October 30–November 1, 2024.
The 17 full papers and 5 short papers included in this book were carefully reviewed and selected from 40 submissions. They were organized in topical sections as follows: Best Paper Award; Industry and Challenge Tracks; Mutation Testing and Code Generation; Advancing Code Vulnerability Detection; Short Papers; Tutorial; Journal First; Health Track; Innovations in Software Testing and AI Compliance; Improving Software Testing Reliability and Advancements in Testing Methodologies.

Cover: Simulation Tools and Techniques
  • Autor: Juan, Angel A.
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 28.04.2025
  • Genre: Sonstiges

Simulation Tools and Techniques

This book constitutes the refereed post-conference proceedings of the 16th EAI International Conference on Simulation Tools and Techniques, SIMUTools 2024, held in Bratislava, Slovakia, in December 2024.

The 26 full papers included in this book were carefully reviewed and selected from 63 submissions. They were organized in topical sections as follows: simulation tools and methods, traffic simulations, logistics and manufacturing, robotics simulations, applications of simulations, and network simulations.

Cover: Public-Key Cryptography – PKC 2025
  • Autor: Jager, Tibor
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 07.05.2025
  • Genre: Sonstiges

Public-Key Cryptography – PKC 2025

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.
The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

 

Cover: Public-Key Cryptography – PKC 2025
  • Autor: Jager, Tibor
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 07.05.2025
  • Genre: Sonstiges

Public-Key Cryptography – PKC 2025

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.
The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

Cover: Information Management and Big Data

Information Management and Big Data

This book constitutes the proceedings of the 11th Annual International Conference on Information Management and Big Data, SIMBig 2024, held in Ilo, Peru, during November 20–22, 2024.

The 27 full papers and 1 short paper included in this book were carefully reviewed and selected from 102 submissions. They were organized in topical sections as follows: machine learning and deep learning; natural language processing; mining of social networks and online platforms; and signal and image processing.

Cover: Foundations and Practice of Security
  • Autor: Adi, Kamel
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 29.05.2025
  • Genre: Krimi

Foundations and Practice of Security

This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09–11, 2024.

The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections:


Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical
infrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.
Cover: Euro-Par 2024: Parallel Processing Workshops
  • Autor: Caino-Lores, Silvina
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 09.06.2025
  • Genre: Sonstiges

Euro-Par 2024: Parallel Processing Workshops

The two-volume set LNCS 15385 + 15386 constitutes the proceedings of the workshops and associated events that were held in conjunction with the 30th European Conference on Parallel and Distributed Processing, Euro-Par 2024, which took place in Madrid, Spain, during August 26–30, 2024.

Overall, the Euro-Par Workshops received a total of 84 submissions of which 60 were accepted for presentation. They stem from the following workshops: 

– The 1st European Workshop on Quantum Computing for High-Performance Computing (EUROQHPC 2024)
– The 19th Workshop on Virtualization in High-Performance Cloud Computing (VHPC 2024)
– The 1st Workshop in High-Performance Computing in Physics (PHYSHPC 2024)
– The 4th Workshop on Asynchronous Many-Task Systems for Exascale (AMTE 2024)
– The 3rd EuroHPC Workshop on Dynamic Resources in HPC (DYNRESHPC 2024)
– The 22nd International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HETEROPAR 2024)
– The 1st Workshop on Next Steps in IoT-Edge-Cloud Continuum Evolution: Research and Practice (IECCONT 2024)
– The 1st Workshop about High-Performance e-Science (HIPES 2024)
– The 2nd International Workshop on Scalable Compute Continuum (WSCC 2024)

In addition, the proceedings contain 14 poster and demo papers that have been accepted from 30 submissions, and 18 contributions in the PhD Symposium track that were accepted from 22 submissions. 

Cover: Euro-Par 2024: Parallel Processing Workshops
  • Autor: Caino-Lores, Silvina
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 10.06.2025
  • Genre: Sonstiges

Euro-Par 2024: Parallel Processing Workshops

The two-volume set LNCS 15385 + 15386 constitutes the proceedings of the workshops and associated events that were held in conjunction with the 30th European Conference on Parallel and Distributed Processing, Euro-Par 2024, which took place in Madrid, Spain, during August 26–30, 2024.

Overall, the Euro-Par Workshops received a total of 84 submissions of which 60 were accepted for presentation. They stem from the following workshops: 

– The 1st European Workshop on Quantum Computing for High-Performance Computing (EUROQHPC 2024)
– The 19th Workshop on Virtualization in High-Performance Cloud Computing (VHPC 2024)
– The 1st Workshop in High-Performance Computing in Physics (PHYSHPC 2024)
– The 4th Workshop on Asynchronous Many-Task Systems for Exascale (AMTE 2024)
– The 3rd EuroHPC Workshop on Dynamic Resources in HPC (DYNRESHPC 2024)
– The 22nd International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HETEROPAR 2024)
– The 1st Workshop on Next Steps in IoT-Edge-Cloud Continuum Evolution: Research and Practice (IECCONT 2024)
– The 1st Workshop about High-Performance e-Science (HIPES 2024)
– The 2nd International Workshop on Scalable Compute Continuum (WSCC 2024)

In addition, the proceedings contain 14 poster and demo papers that have been accepted from 30 submissions, and 18 contributions in the PhD Symposium track that were accepted from 22 submissions. 

Cover: Detection of Intrusions and Malware, and Vulnerability Assessment
  • Autor: Egele, Manuel
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 09.07.2025
  • Genre: Krimi

Detection of Intrusions and Malware, and Vulnerability Assessment

The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.

The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections:

Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation.

Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.

Cover: Information Security Education. Empowering People Through Information Security Education
  • Autor: Drevin, Lynette
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 25.07.2025
  • Genre: Krimi

Information Security Education. Empowering People Through Information Security Education

This book constitutes the refereed proceedings of the 17th IFIP WG 11.8 World Conference on Information Security Education, WISE 2025, held in Maribor, Slovenia, during May 21–23, 2025.
The 13 full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in the following topical sections: Workforce and Curriculum Development; Curriculum and Research Development; Gamification in Cybersecurity Education; Innovative Approaches to Cybersecurity Awareness; Papers Invited from SEC; and Discussions.

Cover: Computational Intelligence in Data Science
  • Autor: Mercier-Laurent, Eunika
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 30.09.2025
  • Genre: Sonstiges

Computational Intelligence in Data Science

The three-volume set IFIP ICCIDS 748, 749 and 750 constitutes the refereed post-conference proceedings of the 8th IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2025, held in Chennai, India, during February 12–14, 2025. 


The 91 papers including 70 regular papers and 21 short papers included in these proceedings were carefully reviewed and selected from 317 submissions. The papers are organized in the following topical sections:


Part I: Computer Vision for Real World Applications.


Part II: Computer Vision for Real World Applications; Emerging Trends in AI for Speech and Text.


Part III: Emerging Trends in AI for Speech and Text; Computational Intelligence for Secure, Smart and Sustainable Applications

Cover: GenAI and LLMs for Beyond 5G Networks
  • Autor: Singh, Sukhdeep
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 15.12.2025
  • Genre: Sonstiges

GenAI and LLMs for Beyond 5G Networks

Beyond 5G and 6G Networks, the AI-Native Revolution explores the transformative convergence of generative artificial intelligence (GenAI), large language models (LLMs), and next-generation telecommunications. This book delves into the architectural innovations enabling AI-driven connectivity, from intelligent edge devices to adaptive radio access networks. It covers the integration of GenAI for real-time network optimization, generative modeling of wireless channels, and advanced analytics for actionable insights. Security frameworks for AI-native systems, orchestration of autonomous networks, and the fusion of AI with signal processing are thoroughly examined, offering practical solutions for researchers, engineers, and policymakers.

 The book also addresses the challenges of computational constraints, ethical dilemmas, and regulatory complexities in deploying AI-driven networks. It provides a technical yet accessible roadmap for building equitable, trustworthy, and efficient systems, balancing innovation with responsibility. With insights grounded in rigorous research and real-world applications, this work is a guide for students, practitioners, and visionaries shaping the future of connectivity. It invites readers to reimagine networks as intelligent ecosystems that anticipate needs and empower humanity’s highest aspirations.

Cover: Digital Forensics and Cyber Crime
  • Band: 441
  • Autor: Gladyshev, Pavel
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 03.06.2022
  • Genre: Krimi

Digital Forensics and Cyber Crime

This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually.

The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.

Cover: Digital Forensics and Cyber Crime
  • Band: 570
  • Autor: Goel, Sanjay
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 02.04.2024
  • Genre: Krimi

Digital Forensics and Cyber Crime

The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.

The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:
Volume I:
Crime profile analysis and Fact checking, Information hiding and Machine learning.

Volume II: 
Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Cover: Information and Communication Technologies for Ageing Well and e-Health
  • Band: 578
  • Autor: Helfert, Markus
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 26.12.2015
  • Genre: Sonstiges

Information and Communication Technologies for Ageing Well and e-Health

This book constitutes the thoroughly refereedproceedings of the International Conference on Communication Technologies forAgeing Well and e-Health, ICT4AgeingWell 2015, held in Lisbon, Portugal, in May2015.
The 11 full papers and two invited papers presented were carefully reviewed andselected from 45 submissions. The papers cover five main topic areas, covering different aspects, including Ambient AssistedLiving, Telemedicine and E-Health, Monitoring, Accessibility and UserInterfaces, Robotics and Devices for Independent Living and HCI for Ageing Populations.

Cover: ICT Systems Security and Privacy Protection
  • Band: 648
  • Autor: Meng, Weizhi
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 03.06.2022
  • Genre: Krimi

ICT Systems Security and Privacy Protection

This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.

Cover: Critical Infrastructure Protection XVI
  • Band: 666
  • Autor: Staggs, Jason
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 29.11.2022
  • Genre: Krimi

Critical Infrastructure Protection XVI

The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.  Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.

Critical Infrastructure Protection XVI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.  Areas of coverage include: Industrial Control Systems Security; Telecommunications Systems Security; Infrastructure Security.

This book is the 16th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.  


The book contains a selection of 11 edited papers from the Fifteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held as a virtual event during March, 2022.

Critical Infrastructure Protection XVI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Cover: Machine Learning and Principles and Practice of Knowledge Discovery in Databases
  • Band: 1524
  • Autor: Kamp, Michael
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 17.02.2022
  • Genre: Kinderbuch

Machine Learning and Principles and Practice of Knowledge Discovery in Databases

This two-volume set constitutes the refereed proceedings of the workshops which complemented the 21th Joint European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD, held in September 2021. Due to the COVID-19 pandemic the conference and workshops were held online. The 104 papers were thoroughly reviewed and selected from 180 papers submited for the workshops. This two-volume set includes the proceedings of the following workshops:Workshop on Advances in Interpretable Machine Learning and Artificial Intelligence (AIMLAI 2021)Workshop on Parallel, Distributed and Federated Learning (PDFL 2021)Workshop on Graph Embedding and Mining  (GEM 2021)Workshop on Machine Learning for Irregular Time-series (ML4ITS 2021)Workshop on IoT, Edge, and Mobile for Embedded Machine Learning (ITEM 2021)Workshop on eXplainable Knowledge Discovery in Data Mining (XKDD 2021)Workshop on Bias and Fairness in AI (BIAS 2021)Workshop on Workshop on Active Inference (IWAI 2021)Workshop on Machine Learning for Cybersecurity (MLCS 2021)Workshop on Machine Learning in Software Engineering (MLiSE 2021)Workshop on MIning Data for financial applications (MIDAS 2021)Sixth Workshop on Data Science for Social Good (SoGood 2021)Workshop on Machine Learning for Pharma and Healthcare Applications (PharML 2021)Second Workshop on Evaluation and Experimental Design in Data Mining and Machine Learning (EDML 2020)Workshop on Machine Learning for Buildings Energy Management (MLBEM 2021)
Cover: Quality of Information and Communications Technology
  • Band: 1621
  • Autor: Vallecillo, Antonio
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 05.09.2022
  • Genre: Krimi

Quality of Information and Communications Technology

This book constitutes the refereed proceedings of the 15th International Conference on the Quality of Information and Communications Technology, QUATIC 2022, held in Talavera de la Reina, Spain, in September 2022.
The 18 full papers and 3 short papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections: smart and advanced systems; verification and validation; skills and education; industrial experiences and applications; safety, security and privacy.
Cover: Silicon Valley Cybersecurity Conference
  • Band: 1683
  • Autor: Bathen, Luis
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 18.01.2023
  • Genre: Krimi

Silicon Valley Cybersecurity Conference

This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022.
The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment.

This is an open access book.

Cover: Network and System Security
  • Band: 13041
  • Autor: Yang, Min
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 04.01.2022
  • Genre: Krimi

Network and System Security

This book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021.

The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.


Cover: Security and Artificial Intelligence
  • Band: 13049
  • Autor: Batina, Lejla
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 07.04.2022
  • Genre: Krimi

Security and Artificial Intelligence

AI has become an emerging technology to assess security and privacy, with many challenges and potential solutions at the algorithm, architecture, and implementation levels. So far, research on AI and security has looked at subproblems in isolation but future solutions will require sharing of experience and best practice in these domains.

The editors of this State-of-the-Art Survey invited a cross-disciplinary team of researchers to a Lorentz workshop in 2019 to improve collaboration in these areas. Some contributions were initiated at the event, others were developed since through further invitations, editing, and cross-reviewing. This contributed book contains 14 invited chapters that address side-channel attacks and fault injection, cryptographic primitives, adversarial machine learning, and intrusion detection. The chapters were evaluated based on their significance, technical quality, and relevance to the topics of security and AI, and each submission was reviewed in single-blindmode and revised.

 

Cover: Critical Information Infrastructures Security
  • Band: 13139
  • Autor: Percia David, Dimitri
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 01.01.2022
  • Genre: Krimi

Critical Information Infrastructures Security

This book constitutes the refereed proceedings of the 16th International Conference on Critical Information Infrastructures Security, CRITIS 2021, which took place in Lausanne, Switzerland, during September 27-29, 2021.

The 12 full papers included in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services.

Cover: Applied Cryptography and Network Security Workshops
  • Band: 13285
  • Autor: Zhou, Jianying
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 23.09.2022
  • Genre: Krimi

Applied Cryptography and Network Security Workshops

This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. 

The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops:

– AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security

– AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security

– AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security

– CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security

– Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy

– SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation

– SecMT: 3rd ACNS Workshop on Security in Mobile Technologies

– SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications

Cover: Foundations and Practice of Security
  • Band: 13291
  • Autor: Aïmeur, Esma
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 14.06.2022
  • Genre: Krimi

Foundations and Practice of Security

This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021.

The 18 full papers and 9 short paper presented in this book were carefully reviewed and selected from 62 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design.

Chapters “A Quantile-based Watermarking Approach for Distortion Minimization”, “Choosing Wordlists for Password Guessing: An Adaptive Multi-Armed Bandit Approach” and “A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Cover: Collaboration Technologies and Social Computing
  • Band: 13632
  • Autor: Wong, Lung-Hsiang
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 22.10.2022
  • Genre: Sonstiges

Collaboration Technologies and Social Computing

This volume constitutes the proceedings of the 28th International Conference on Collaboration Technologies and Social Computing, CollabTech 2022, held in Santiago, Chile during November 8–11, 2022. 

The 18 full and 4 work-in-process papers presented in this volume were selected from 37 submissions and underwent careful double-blind peer review. The papers focus on innovative technical, human and organizational approaches to expand collaboration support including computer science, management science, design science, cognitive and social science.

Cover: Attacks and Defenses for the Internet-of-Things
  • Band: 13745
  • Autor: Li, Wenjuan
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 10.12.2022
  • Genre: Krimi

Attacks and Defenses for the Internet-of-Things

This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode.

The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions.

This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
Cover: Foundations and Practice of Security
  • Band: 13877
  • Autor: Jourdan, Guy-Vincent
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 31.03.2023
  • Genre: Krimi

Foundations and Practice of Security

This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12–14, 2022.
The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
Cover: Applied Cryptography and Network Security Workshops
  • Band: 13907
  • Autor: Zhou, Jianying
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 03.10.2023
  • Genre: Krimi

Applied Cryptography and Network Security Workshops

This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.

The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops:

·  1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023)

·        5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023)

·        4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023)

·        5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023)

·        3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023)

·        5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023)

·        4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023)

·        4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023)

·        5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)

Cover: Data and Applications Security and Privacy XXXVII
  • Band: 13942
  • Autor: Atluri, Vijayalakshmi
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 11.07.2023
  • Genre: Krimi

Data and Applications Security and Privacy XXXVII

This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19–21, 2023.  

The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications.

Cover: Advances in Computer Graphics
  • Band: 14496
  • Autor: Sheng, Bin
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 28.12.2023
  • Genre: Sonstiges

Advances in Computer Graphics

This 4-volume set of LNCS 14495-14498 constitutes the proceedings of the 40th Computer Graphics International Conference, CGI 2023, held in Shanghai, China, August 28 – September 1, 2023.
The 149 papers in this set were carefully reviewed and selected from 385 submissions. They are organized in topical sections as follows: Detection and Recognition; Image Analysis and Processing; Image Restoration and Enhancement; Image Attention and Perception; Reconstruction; Rendering and Animation; Synthesis and Generation; Visual Analytics and Modeling; Graphics and AR/VR; Medical Imaging and Robotics; Theoretical Analysis; Image Analysis and Visualization in Advanced Medical Imaging Technology; Empowering Novel Geometric Algebra for Graphics and Engineering.
Cover: Advances in Computer Graphics
  • Band: 14498
  • Autor: Sheng, Bin
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 23.12.2023
  • Genre: Sonstiges

Advances in Computer Graphics

This 4-volume set of LNCS 14495-14498 constitutes the proceedings of the 40th Computer Graphics International Conference, CGI 2023, held in Shanghai, China, August 28 – September 1, 2023.
The 149 papers in this set were carefully reviewed and selected from 385 submissions. They are organized in topical sections as follows: Detection and Recognition; Image Analysis and Processing; Image Restoration and Enhancement; Image Attention and Perception; Reconstruction; Rendering and Animation; Synthesis and Generation; Visual Analytics and Modeling; Graphics and AR/VR; Medical Imaging and Robotics; Theoretical Analysis; Image Analysis and Visualization in Advanced Medical Imaging Technology; Empowering Novel Geometric Algebra for Graphics and Engineering.
Cover: Computational Mathematics Modeling in Cancer Analysis
  • Band: 15181
  • Autor: Wu, Jia
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 04.10.2024
  • Genre: Sonstiges

Computational Mathematics Modeling in Cancer Analysis

This book constitutes the refereed proceedings of Third International Workshop on Computational Mathematics Modeling in Cancer Analysis, CMMCA 2024, held in Marrakesh, Morocco, on October 6, 2024, in conjunction with MICCAI 2024. 

The 12 full papers presented in this book were carefully reviewed and selected from 14 submissions. CMMCA serves as a platform for collaboration among professionals in mathematics, engineering, computer science, and medicine, focusing on innovative mathematical methods for analyzing complex cancer data.

Diesen Artikel teilen