You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.
The two-volume set LNCS 10569 and LNCS 10570 constitutes the proceedings of the 18th International Conference on Web Information Systems Engineering, WISE 2017, held in Puschino, Russia, in October 2017. The 49 full papers and 24 short papers presented were carefully reviewed and selected from 195 submissions. The papers cover a wide range of topics such as microblog data analysis, social network data analysis, data mining, pattern mining, event detection, cloud computing, query processing, spatial and temporal data, graph theory, crowdsourcing and crowdsensing, web data model, language processing and web protocols, web-based applications, data storage and generator, security and privacy, sentiment analysis, and recommender systems.
This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020. The 48 papers were carefully reviewed and selected from 131 submissions and cover a broad range of topics on security, privacy and anonymity in computation communication, and storage, including the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the Second International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.
"This book provides academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations for situational awareness in computer networks"--Provided by publisher.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The CyberICPS Workshop received 13 submissions from which 5 full...
This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.