Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13407)
Included in the following conference series:
Conference proceedings info: ICICS 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 34 revised full papers presented in the book were carefully selected from 150 submissions
The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
Similar content being viewed by others
Keywords
- artificial intelligence
- authentication
- communication
- computer crime
- computer networks
- computer science
- computer security
- computer systems
- cryptography
- data security
- education
- engineering
- internet
- learning
- machine learning
- mathematics
- network protocols
- network security
- signal processing
- telecommunication systems
Table of contents (34 papers)
-
Cryptography
-
Privacy and Anonymity
Other volumes
-
Information and Communications Security
Editors and Affiliations
Bibliographic Information
Book Title: Information and Communications Security
Book Subtitle: 24th International Conference, ICICS 2022, Canterbury, UK, September 5–8, 2022, Proceedings
Editors: Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-15777-6
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2022
Softcover ISBN: 978-3-031-15776-9Published: 24 August 2022
eBook ISBN: 978-3-031-15777-6Published: 23 August 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVII, 640
Number of Illustrations: 42 b/w illustrations, 134 illustrations in colour
Topics: Data Structures and Information Theory, Database Management, Data Mining and Knowledge Discovery, Information Systems Applications (incl. Internet), Computer Imaging, Vision, Pattern Recognition and Graphics, Cryptology