Veelasha Moonsamy - Böcker
Visar alla böcker från författaren Veelasha Moonsamy. Handla med fri frakt och snabb leverans.
5 produkter
5 produkter
Del 15825 - Lecture Notes in Computer Science
Applied Cryptography and Network Security
23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part I
Häftad, Engelska, 2025
1 422 kr
Skickas inom 7-10 vardagar
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.
Del 15826 - Lecture Notes in Computer Science
Applied Cryptography and Network Security
23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part II
Häftad, Engelska, 2025
1 516 kr
Skickas inom 7-10 vardagar
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.
Del 15827 - Lecture Notes in Computer Science
Applied Cryptography and Network Security
23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part III
Häftad, Engelska, 2025
1 516 kr
Skickas inom 7-10 vardagar
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.
Del 15747 - Lecture Notes in Computer Science
Detection of Intrusions and Malware, and Vulnerability Assessment
22nd International Conference, DIMVA 2025, Graz, Austria, July 9–11, 2025, Proceedings, Part I
Häftad, Engelska, 2025
620 kr
Skickas inom 10-15 vardagar
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections:Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation.Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
Del 15748 - Lecture Notes in Computer Science
Detection of Intrusions and Malware, and Vulnerability Assessment
22nd International Conference, DIMVA 2025, Graz, Austria, July 9–11, 2025, Proceedings, Part II
Häftad, Engelska, 2025
704 kr
Skickas inom 10-15 vardagar
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections:Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation.Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.