 
                This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
Weiterlesen 
                The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Weiterlesen 
                The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Weiterlesen 
                This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...
Weiterlesen 
                This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...
Weiterlesen 
                It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...
Weiterlesen 
                Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
WeiterlesenThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Weiterlesen 
                INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
Weiterlesen 
                On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
Weiterlesen 
                The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
Weiterlesen 
                This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Weiterlesen 
                This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Weiterlesen 
                This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Weiterlesen 
                This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Weiterlesen 
                Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...
WeiterlesenThis book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...
Weiterlesen 
                This volume introduces the technical issues surrounding security, as well as how security policies are formulated at the ...
Weiterlesen