This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
Lire la suite
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Lire la suite
The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Lire la suite
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Lire la suite
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...
Lire la suite
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...
Lire la suite
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...
Lire la suite
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...
Lire la suite
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Lire la suiteThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Lire la suite
INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
Lire la suite
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
Lire la suite
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
Lire la suite
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lire la suite
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Lire la suite
This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suite
This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suite
Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...
Lire la suiteThis book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...
Lire la suite
This volume introduces the technical issues surrounding security, as well as how security policies are formulated at the ...
Lire la suite