0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (18)
  • R2,500 - R5,000 (9)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 25 of 28 matches in All Departments

Deep Biometrics (Hardcover, 1st ed. 2020): Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger Deep Biometrics (Hardcover, 1st ed. 2020)
Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
R3,548 Discovery Miles 35 480 Ships in 10 - 15 working days

This book highlights new advances in biometrics using deep learning toward deeper and wider background, deeming it "Deep Biometrics". The book aims to highlight recent developments in biometrics using semi-supervised and unsupervised methods such as Deep Neural Networks, Deep Stacked Autoencoder, Convolutional Neural Networks, Generative Adversary Networks, and so on. The contributors demonstrate the power of deep learning techniques in the emerging new areas such as privacy and security issues, cancellable biometrics, soft biometrics, smart cities, big biometric data, biometric banking, medical biometrics, healthcare biometrics, and biometric genetics, etc. The goal of this volume is to summarize the recent advances in using Deep Learning in the area of biometric security and privacy toward deeper and wider applications. Highlights the impact of deep learning over the field of biometrics in a wide area; Exploits the deeper and wider background of biometrics, such as privacy versus security, biometric big data, biometric genetics, and biometric diagnosis, etc.; Introduces new biometric applications such as biometric banking, internet of things, cloud computing, and medical biometrics.

Botnets - Architectures, Countermeasures, and Challenges (Paperback): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Paperback)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R1,324 R1,147 Discovery Miles 11 470 Save R177 (13%) Ships in 9 - 15 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June... ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings (Hardcover, 1st ed. 2022)
Weizhi Meng, Simone Fischer-Hubner, Christian D. Jensen
R3,130 Discovery Miles 31 300 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.

Protecting Mobile Networks and Devices - Challenges and Solutions (Paperback): Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying... Protecting Mobile Networks and Devices - Challenges and Solutions (Paperback)
Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
R1,312 Discovery Miles 13 120 Ships in 12 - 17 working days

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud... Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings (1st ed. 2023)
Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, …
R2,559 Discovery Miles 25 590 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: ·  1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) ·        5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) ·        4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) ·        5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) ·        3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) ·        5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) ·        4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) ·        4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) ·        5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)

Deep Biometrics (Paperback, 1st ed. 2020): Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger Deep Biometrics (Paperback, 1st ed. 2020)
Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
R3,518 Discovery Miles 35 180 Ships in 10 - 15 working days

This book highlights new advances in biometrics using deep learning toward deeper and wider background, deeming it "Deep Biometrics". The book aims to highlight recent developments in biometrics using semi-supervised and unsupervised methods such as Deep Neural Networks, Deep Stacked Autoencoder, Convolutional Neural Networks, Generative Adversary Networks, and so on. The contributors demonstrate the power of deep learning techniques in the emerging new areas such as privacy and security issues, cancellable biometrics, soft biometrics, smart cities, big biometric data, biometric banking, medical biometrics, healthcare biometrics, and biometric genetics, etc. The goal of this volume is to summarize the recent advances in using Deep Learning in the area of biometric security and privacy toward deeper and wider applications. Highlights the impact of deep learning over the field of biometrics in a wide area; Exploits the deeper and wider background of biometrics, such as privacy versus security, biometric big data, biometric genetics, and biometric diagnosis, etc.; Introduces new biometric applications such as biometric banking, internet of things, cloud computing, and medical biometrics.

Protecting Mobile Networks and Devices - Challenges and Solutions (Hardcover): Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying... Protecting Mobile Networks and Devices - Challenges and Solutions (Hardcover)
Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
R2,080 Discovery Miles 20 800 Ships in 12 - 17 working days

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

International Conference on Neural Computing for Advanced Applications - 4th International Conference, NCAA 2023, Hefei, China,... International Conference on Neural Computing for Advanced Applications - 4th International Conference, NCAA 2023, Hefei, China, July 7–9, 2023, Proceedings, Part I (1st ed. 2023)
Haijun Zhang, Yinggen Ke, Zhou Wu, Tianyong Hao, Zhao Zhang, …
R2,610 Discovery Miles 26 100 Ships in 10 - 15 working days

The two-volume set CCIS 1869 and 1870 constitutes the refereed proceedings of the 4th International Conference on Neural Computing for Advanced Applications, NCAA 2023, held in Hefei, China, in July 2023. The 83 full papers and 1 short paper presented in these proceedings were carefully reviewed and selected from 211 submissions. The papers have been organized in the following topical sections: Neural network (NN) theory, NN-based control systems, neuro-system integration and engineering applications; Machine learning and deep learning for data mining and data-driven applications; Computational intelligence, nature-inspired optimizers, and their engineering applications; Deep learning-driven pattern recognition, computer vision and its industrial applications; Natural language processing, knowledge graphs, recommender systems, and their applications; Neural computing-based fault diagnosis and forecasting, prognostic management, and cyber-physical system security; Sequence learning for spreading dynamics, forecasting, and intelligent techniques against epidemic spreading (2); Applications of Data Mining, Machine Learning and Neural Computing in Language Studies; Computational intelligent Fault Diagnosis and Fault-Tolerant Control, and Their Engineering Applications; and Other Neural computing-related topics.

International Conference on Neural Computing for Advanced Applications - 4th International Conference, NCAA 2023, Hefei, China,... International Conference on Neural Computing for Advanced Applications - 4th International Conference, NCAA 2023, Hefei, China, July 7–9, 2023, Proceedings, Part II (1st ed. 2023)
Haijun Zhang, Yinggen Ke, Zhou Wu, Tianyong Hao, Zhao Zhang, …
R2,856 Discovery Miles 28 560 Ships in 10 - 15 working days

The two-volume set CCIS 1869 and 1870 constitutes the refereed proceedings of the 4th International Conference on Neural Computing for Advanced Applications, NCAA 2023, held in Hefei, China, in July 2023. The 83 full papers and 1 short paper presented in these proceedings were carefully reviewed and selected from 211 submissions. The papers have been organized in the following topical sections: Neural network (NN) theory, NN-based control systems, neuro-system integration and engineering applications; Machine learning and deep learning for data mining and data-driven applications; Computational intelligence, nature-inspired optimizers, and their engineering applications; Deep learning-driven pattern recognition, computer vision and its industrial applications; Natural language processing, knowledge graphs, recommender systems, and their applications; Neural computing-based fault diagnosis and forecasting, prognostic management, and cyber-physical system security; Sequence learning for spreading dynamics, forecasting, and intelligent techniques against epidemic spreading (2); Applications of Data Mining, Machine Learning and Neural Computing in Language Studies; Computational intelligent Fault Diagnosis and Fault-Tolerant Control, and Their Engineering Applications; and Other Neural computing-related topics.

ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June... ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Simone Fischer-Hübner, Christian D. Jensen
R3,099 Discovery Miles 30 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.

Blockchain Technology and Emerging Technologies - Second EAI International Conference, BlockTEA 2022, Virtual Event, November... Blockchain Technology and Emerging Technologies - Second EAI International Conference, BlockTEA 2022, Virtual Event, November 21-22, 2022, Proceedings (1st ed. 2023)
Weizhi Meng, Wenjuan Li
R1,798 Discovery Miles 17 980 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second EAI International Conference on Blockchain Technology and Emerging Technologies, BlockTEA 2022, held in Virtual Event, during November 21-22, 2022.  The 10 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: answer set programming; functional programming; Smart contract, Privacy protection, NFT and Machine learning

Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October... Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022, which was held in October 2022. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers and 10 short papers, presented were carefully reviewed and selected from 91 submissions. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems

Attacks and Defenses for the Internet-of-Things - 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30,... Attacks and Defenses for the Internet-of-Things - 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Wenjuan Li, Steven Furnell, Weizhi Meng
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode.The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September... Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
R2,686 Discovery Miles 26 860 Ships in 10 - 15 working days

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September... Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September... Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
R1,607 Discovery Miles 16 070 Ships in 10 - 15 working days

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Proceedings of the Seventh International Conference on Mathematics and Computing - ICMC 2021 (Paperback, 1st ed. 2022): Debasis... Proceedings of the Seventh International Conference on Mathematics and Computing - ICMC 2021 (Paperback, 1st ed. 2022)
Debasis Giri, Kim-Kwang Raymond Choo, Saminathan Ponnusamy, Weizhi Meng, Sedat Akleylek, …
R6,392 Discovery Miles 63 920 Ships in 10 - 15 working days

This book features selected papers from the 7th International Conference on Mathematics and Computing (ICMC 2021), organized by Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India, during March 2021. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry.

Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November... Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Weizhi Meng, Sokratis K. Katsikas
R1,805 Discovery Miles 18 050 Ships in 10 - 15 working days

This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online.

Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE,... Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Sokratis Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, …
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021. The conference was initially planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic.The 32 papers included in these proceedings stem from the following workshops: the 7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, which accepted 7 papers from 16 submissions; the 5th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, which accepted 5 papers from 8 submissions; the 4th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, which accepted 6 full and 1 short paper out of 15 submissions; the 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2021, which accepted 5 full and 1 short paper out of 13 submissions. the 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021, which accepted 3 full and 1 short paper out of 6 submissions; and the 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2021, which accepted 3 papers out of 7 submissions. The following papers are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com:Why IT Security Needs Therapy by Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen Verret Transferring Update Behavior from Smartphones to Smart Consumer Devices by Matthias Fassl, Michaela Neumayr, Oliver Schedler, and Katharina Krombholz Organisational Contexts of Energy Cybersecurity by Tania Wallis, Greig Paul, and James Irvine SMILE - Smart eMaIl Link domain Extractor by Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things by Salatiel Ezennaya-Gomez, Claus Vielhauer, and Jana Dittmann Data Protection Impact Assessments in Practice - Experiences from Case Studies by Michael Friedewald, Ina Schiering, Nicholas Martin, and Dara Hallinan

Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings... Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Mauro Conti
R1,809 Discovery Miles 18 090 Ships in 10 - 15 working days

The LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021.The 9 full papers and 5 short papers presented in this book were carefully reviewed and selected from 35 submissions. The conference focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings (Paperback,... Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings (Paperback, 1st ed. 2021)
Joseph K. Liu, Sokratis Katsikas, Weizhi Meng, Willy Susilo, Rolly Intan
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.

Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021,... Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings (Paperback, 1st ed. 2021)
Robert Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, …
R2,223 Discovery Miles 22 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August... Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings (Paperback, 1st ed. 2021)
Ding Wang, Weizhi Meng, Jinguang Han
R1,522 Discovery Miles 15 220 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020,... Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Sokratis Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, …
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019,... Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings (Paperback, 1st ed. 2019)
Weizhi Meng, Piotr Cofta, Christian Damsgaard Jensen, Tyrone Grandison
R1,452 Discovery Miles 14 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2019, held in Copenhagen, Denmark, in July 2019. The 7 revised full papers, 3 short papers, and 6 work-in-progress papers presented were carefully reviewed and selected from 32 submissions. The papers cover a broad range of topics related to trust, security and privacy and focus on trust in information technology and identity management, socio-technical and sociological trust, and emerging technology for trust.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
White Glo Floss Charcoal Mint
R50 Discovery Miles 500
Sudocrem Skin & Baby Care Barrier Cream…
R128 Discovery Miles 1 280
Parker Jotter Duo S. Steel Ballpoint Pen…
 (5)
R599 R523 Discovery Miles 5 230
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R289 Discovery Miles 2 890
Tenet
John David Washington, Robert Pattinson, … DVD  (1)
R51 Discovery Miles 510
Snappy Tritan Bottle (1.5L)(Green)
R229 R180 Discovery Miles 1 800
Britney Spears Fantasy Eau De Parfum…
R1,037 R507 Discovery Miles 5 070
Salvatore Ferragamo Signorina In Fiore…
R1,437 Discovery Miles 14 370

 

Partners