|
Showing 1 - 6 of
6 matches in All Departments
This book constitutes the proceedings of the 14th International
Workshop on Security and Trust Management, STM 2018, held in
Barcelona, Spain, in September 2018, and co-located with the 23rd
European Symposium Research in Computer Security, ESORICS 2018. The
8 full papers were carefully reviewed and selected from 28
submissions. The focus of the workshop was on the following topics:
cryptosystems and applied cryptography; modeling and risk
assessment; and trust computing.
|
Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar
|
R3,360
Discovery Miles 33 600
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 16th
International Conference on Network and System Security, NSS 2022,
held in Denarau Island, Fiji, on December 9-12, 2022. The 23 full
and 18 short papers presented in this book were carefully reviewed
and selected from 83 submissions. They focus on theoretical and
practical aspects of network and system security, such as
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability of computer
networks and systems.
|
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings (Paperback, 1st ed. 2022)
Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, …
|
R1,667
Discovery Miles 16 670
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the satellite workshops
held around the 20th International Conference on Applied
Cryptography and Network Security, ACNS 2022, held in Rome, Italy,
in June 2022. Due to the Corona pandemic the workshop was held as a
virtual event. The 31 papers presented in this volume were
carefully reviewed and selected from 52 submissions. They stem from
the following workshops: - AIBlock: 4th ACNS Workshop on
Application Intelligence and Blockchain Security - AIHWS: 3rd ACNS
Workshop on Artificial Intelligence in Hardware Security - AIoTS:
4th ACNS Workshop on Artificial Intelligence and Industrial IoT
Security - CIMSS: 2nd ACNS Workshop on Critical Infrastructure and
Manufacturing System Security - Cloud S&P: 4th ACNS Workshop on
Cloud Security and Privacy - SCI: 3rd ACNS Workshop on Secure
Cryptographic Implementation - SecMT: 3rd ACNS Workshop on Security
in Mobile Technologies - SiMLA: 4th ACNS Workshop on Security in
Machine Learning and its Applications
|
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings (Paperback, 1st ed. 2022)
Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
|
R3,072
Discovery Miles 30 720
|
Ships in 10 - 15 working days
|
This LNCS 13407 constitutes the refereed proceedings of the 24th
International Conference on Information and Communications
Security, ICICS 2022, held in Canterbury, UK,, in September 2022.
The 34 revised full papers presented in the book were carefully
selected from 150 submissions The papers are organized around the
following topics: Cryptography, Authentication, Privacy and
Anonymity, Attacks and Vulnerability Analysis, Artificial
Intelligence for Detection, and Network Security and Forensics.
This book, written by leaders in the protection field of critical
infrastructures, provides an extended overview of the technological
and operative advantages together with the security problems and
challenges of the new paradigm of the Internet of Things in today's
industry, also known as the Industry Internet of Things (IIoT). The
incorporation of the new embedded technologies and the
interconnected networking advances in the automation and monitoring
processes, certainly multiplies the functional complexities of the
underlying control system, whilst increasing security and privacy
risks. The critical nature of the application context and its
relevance for the well-being of citizens and their economy,
attracts the attention of multiple, advanced attackers, with
stealthy abilities to evade security policies, ex-filter
information or exploit vulnerabilities. Some real-life events and
registers in CERTs have already clearly demonstrated how the
control industry can become vulnerable to multiple types of
advanced threats whose focus consists in hitting the safety and
security of the control processes. This book, therefore, comprises
a detailed spectrum of research papers with highly analytical
content and actuation procedures to cover the relevant security and
privacy issues such as data protection, awareness, response and
resilience, all of them working at optimal times. Readers will be
able to comprehend the construction problems of the fourth
industrial revolution and are introduced to effective, lightweight
protection solutions which can be integrated as part of the new
IIoT-based monitoring ecosystem.
This book, written by leaders in the protection field of critical
infrastructures, provides an extended overview of the technological
and operative advantages together with the security problems and
challenges of the new paradigm of the Internet of Things in today's
industry, also known as the Industry Internet of Things (IIoT). The
incorporation of the new embedded technologies and the
interconnected networking advances in the automation and monitoring
processes, certainly multiplies the functional complexities of the
underlying control system, whilst increasing security and privacy
risks. The critical nature of the application context and its
relevance for the well-being of citizens and their economy,
attracts the attention of multiple, advanced attackers, with
stealthy abilities to evade security policies, ex-filter
information or exploit vulnerabilities. Some real-life events and
registers in CERTs have already clearly demonstrated how the
control industry can become vulnerable to multiple types of
advanced threats whose focus consists in hitting the safety and
security of the control processes. This book, therefore, comprises
a detailed spectrum of research papers with highly analytical
content and actuation procedures to cover the relevant security and
privacy issues such as data protection, awareness, response and
resilience, all of them working at optimal times. Readers will be
able to comprehend the construction problems of the fourth
industrial revolution and are introduced to effective, lightweight
protection solutions which can be integrated as part of the new
IIoT-based monitoring ecosystem.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|