Amazon cover image
Image from Amazon.com

Information and Communications Security [electronic resource] : 24th International Conference, ICICS 2022, Canterbury, UK, September 5–8, 2022, Proceedings /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 13407Publisher: Cham : Springer International Publishing : Imprint: Springer, 2022Edition: 1st ed. 2022Description: XVII, 640 p. 176 illus., 134 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031157776
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.73 23
  • 003.54 23
LOC classification:
  • QA76.9.D35
  • Q350-390
Online resources:
Contents:
Cryptography -- Authentication -- Privacy and Anonymity -- Attacks and Vulnerability Analysis -- Artificial Intelligence for Detection -- Network Security and Forensics. .
In: Springer Nature eBookSummary: This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cryptography -- Authentication -- Privacy and Anonymity -- Attacks and Vulnerability Analysis -- Artificial Intelligence for Detection -- Network Security and Forensics. .

This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in