Atjaunināt sīkdatņu piekrišanu

Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 58, 2022, Proceedings 1st ed. 2022 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 640 pages, height x width: 235x155 mm, weight: 997 g, 134 Illustrations, color; 42 Illustrations, black and white; XVII, 640 p. 176 illus., 134 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13407
  • Izdošanas datums: 24-Aug-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031157761
  • ISBN-13: 9783031157769
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 640 pages, height x width: 235x155 mm, weight: 997 g, 134 Illustrations, color; 42 Illustrations, black and white; XVII, 640 p. 176 illus., 134 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13407
  • Izdošanas datums: 24-Aug-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031157761
  • ISBN-13: 9783031157769
This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions





The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
Cryptography.- Authentication.- Privacy and Anonymity.- Attacks and
Vulnerability Analysis.- Artificial Intelligence for Detection.- Network
Security and Forensics.