1 option
Information and Communications Security : 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings / edited by Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- Lecture notes in computer science 1611-3349 ; 13407
- Lecture Notes in Computer Science, 1611-3349 ; 13407
- Language:
- English
- Subjects (All):
- Data structures (Computer science).
- Information theory.
- Database management.
- Data mining.
- Application software.
- Image processing-Digital techniques.
- Computer vision.
- Cryptography.
- Data encryption (Computer science).
- Data Structures and Information Theory.
- Database Management.
- Data Mining and Knowledge Discovery.
- Computer and Information Systems Applications.
- Computer Imaging, Vision, Pattern Recognition and Graphics.
- Cryptology.
- Local Subjects:
- Data Structures and Information Theory.
- Database Management.
- Data Mining and Knowledge Discovery.
- Computer and Information Systems Applications.
- Computer Imaging, Vision, Pattern Recognition and Graphics.
- Cryptology.
- Physical Description:
- 1 online resource (XVII, 640 pages) : 176 illustrations, 134 illustrations in color.
- Edition:
- 1st ed. 2022.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2022.
- System Details:
- text file PDF
- Summary:
- This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
- Contents:
- Cryptography
- Authentication
- Privacy and Anonymity
- Attacks and Vulnerability Analysis
- Artificial Intelligence for Detection
- Network Security and Forensics. .
- Other Format:
- Printed edition:
- ISBN:
- 978-3-031-15777-6
- 9783031157776
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.