My Account Log in

1 option

Information and Communications Security : 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings / edited by Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Alcaraz, Cristina, Editor.
Chen, Liqun, Editor.
Li, Shujun, Editor.
Samarati, Pierangela, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Lecture notes in computer science 1611-3349 ; 13407
Lecture Notes in Computer Science, 1611-3349 ; 13407
Language:
English
Subjects (All):
Data structures (Computer science).
Information theory.
Database management.
Data mining.
Application software.
Image processing-Digital techniques.
Computer vision.
Cryptography.
Data encryption (Computer science).
Data Structures and Information Theory.
Database Management.
Data Mining and Knowledge Discovery.
Computer and Information Systems Applications.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Cryptology.
Local Subjects:
Data Structures and Information Theory.
Database Management.
Data Mining and Knowledge Discovery.
Computer and Information Systems Applications.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Cryptology.
Physical Description:
1 online resource (XVII, 640 pages) : 176 illustrations, 134 illustrations in color.
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
Contents:
Cryptography
Authentication
Privacy and Anonymity
Attacks and Vulnerability Analysis
Artificial Intelligence for Detection
Network Security and Forensics. .
Other Format:
Printed edition:
ISBN:
978-3-031-15777-6
9783031157776
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account