2022 IEEE 47th Conference on Local Computer Networks (LCN)

2022 IEEE 47th Conference on Local Computer Networks (LCN)

Author: IEEE Staff

Publisher:

Published: 2022-09-26

Total Pages: 0

ISBN-13: 9781665480024

DOWNLOAD EBOOK

The IEEE LCN conference is the premier conference on theoretical and practical aspects of computer networking LCN is highly interactive, enabling an effective interchange of results and ideas among researchers, users, and product developers Major developments from high speed networks to the global Internet to specialized sensor networks have been reported at past LCNs


Cyber Security for Next-Generation Computing Technologies

Cyber Security for Next-Generation Computing Technologies

Author: Inam Ullah Khan Ullah Khan

Publisher: CRC Press

Published: 2024-01-19

Total Pages: 339

ISBN-13: 1003826423

DOWNLOAD EBOOK

This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. KEY FEATURES Highlights innovative principles and practices using next generation computing technologies based cybersecurity Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity Offers an overview of theoretical, practical, simulation concepts of cybersecurity


2016 IEEE 41st Conference on Local Computer Networks (LCN)

2016 IEEE 41st Conference on Local Computer Networks (LCN)

Author: IEEE Staff

Publisher:

Published: 2016-11-07

Total Pages:

ISBN-13: 9781509020553

DOWNLOAD EBOOK

The IEEE LCN conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers For the past 40 years, major developments from high speed networks to the global Internet to specialized sensor networks have been reported at this conference


Network and System Security

Network and System Security

Author: Shujun Li

Publisher: Springer Nature

Published: 2023-08-12

Total Pages: 404

ISBN-13: 3031398289

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14–16, 2023. The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.


Information Security and Cryptology

Information Security and Cryptology

Author: Chunpeng Ge

Publisher: Springer Nature

Published: 2024

Total Pages: 480

ISBN-13: 9819709423

DOWNLOAD EBOOK

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.