You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume of Advances in Soft Computing and Lecture Notes in Computer th Science vols. 5551, 5552 and 5553, constitute the Proceedings of the 6 Inter- tional Symposium of Neural Networks (ISNN 2009) held in Wuhan, China during May 26–29, 2009. ISNN is a prestigious annual symposium on neural networks with past events held in Dalian (2004), Chongqing (2005), Chengdu (2006), N- jing (2007) and Beijing (2008). Over the past few years, ISNN has matured into a well-established series of international conference on neural networks and their applications to other fields. Following this tradition, ISNN 2009 provided an a- demic forum for the participants to disseminate their new research finding...
(Bayreuth University, Germany), Jennie Si (Arizona State University, USA), and Hang Li (MicrosoftResearchAsia, China). Besides the regularsessions andpanels, ISNN 2008 also featured four special sessions focusing on some emerging topics.
This book constitutes the refereed proceedings of the 31st Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017. The 21 full papers and 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on access control, privacy, cloud security, secure storage in the cloud, secure systems, and security in networks and Web.
This volume contains a collection of papers in control theory and applications presented at a conference in honor of Clyde Martin on the occasion of his 60th birthday, held in Lubbock, Texas, November 14-15, 2003.
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops: – AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security – AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security – AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security – CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security – Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy – SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation – SecMT: 3rd ACNS Workshop on Security in Mobile Technologies – SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management Showcases cyber-physical systems (CPSs) security solutions, lightweight ...
The book gives a comprehensive overview of the evolving landscape of cyber-physical systems (CPS) with a primary focus on security challenges and innovative solutions. CPS, encompassing a wide array of applications from e-Health to smart grid and industry automation, is explored in depth through eight edited reviews. The book starts with an exploration of various threat detection and prevention techniques in IoT environments, followed by discussions on security in smart grid cyber-physical systems, and the integration of cyber-physical systems with game theory. It also covers important topics such as cyber-physical systems in healthcare, augmented reality challenges, network and computer for...