×

zbMATH — the first resource for mathematics

Found 214 Documents (Results 1–100)

100
MathJax
Sergeyev, Yaroslav D. (ed.) et al., Numerical computations: theory and algorithms. Third international conference, NUMTA 2019, Crotone, Italy, June 15–21, 2019. Revised selected papers. Part I. Cham: Springer (ISBN 978-3-030-39080-8/pbk; 978-3-030-39081-5/ebook). Lecture Notes in Computer Science 11973, 269-277 (2020).
MSC:  65
PDF BibTeX XML Cite
Full Text: DOI
Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 441-455 (2019).
MSC:  68M25 68M10 68T05
PDF BibTeX XML Cite
Full Text: DOI
Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 468-489 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 759-767 (2018).
MSC:  68P25
PDF BibTeX XML Cite
Full Text: DOI
Rass, Stefan (ed.) et al., Decision and game theory for security. 8th international conference, GameSec 2017, Vienna, Austria, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10575, 234-255 (2017).
MSC:  91A10 91A80 91B32
PDF BibTeX XML Cite
Full Text: DOI
Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 415-434 (2016).
MSC:  91A43 91A80 68M25
PDF BibTeX XML Cite
Full Text: DOI
Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 343-360 (2014).
MSC:  94A60 68P25 68M12
PDF BibTeX XML Cite
Full Text: DOI
Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 45-61 (2013).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI
Baras, John S. (ed.) et al., Decision and game theory for security. Second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25279-2/pbk). Lecture Notes in Computer Science 7037, 7-21 (2011).
PDF BibTeX XML Cite
Full Text: DOI
Rudas, Imre J.(ed) et al., Computational intelligence and informatics. Selected papers based on the presentations at the 10th international symposium of Hungarian researchers on computational intelligence and informatics, Budapest, Hungary, November 12–14, 2009. Berlin: Springer (ISBN 978-3-642-15219-1/hbk; 978-3-642-15220-7/ebook). Studies in Computational Intelligence 313, 27-35 (2010).
MSC:  68M10 68M99
PDF BibTeX XML Cite
Full Text: DOI
Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 395-401 (2010).
MSC:  68M10 68T05 68M11
PDF BibTeX XML Cite
Full Text: DOI
Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 242-252 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI
Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 27-36 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI
Hinchey, Mike (ed.) et al., Distributed, parallel and biologically inspired systems. 7th IFIP TC 10 working conference, DIPES 2010, and 3rd IFIP TC 10 international conference biologically-inspired collaborative computing, BICC 2010, held as part of WCC 2010, Brisbane, Australia, September 20–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15233-7/hbk; 978-3-642-15234-4/ebook). IFIP Advances in Information and Communication Technology 329, 242-253 (2010).
MSC:  68M99 68M14
PDF BibTeX XML Cite
Full Text: DOI
Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 235-247 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI
Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 217-234 (2010).
MSC:  68P05 68M99 68T10
PDF BibTeX XML Cite
Full Text: DOI
Koronacki, Jacek (ed.) et al., Advances in machine learning II. Dedicated to the memory of Professor Ryszard S. Michalski. Berlin: Springer (ISBN 978-3-642-05178-4/hbk; 978-3-642-05179-1/ebook). Studies in Computational Intelligence 263, 485-513 (2010).
MSC:  68T05 68N99
PDF BibTeX XML Cite
Full Text: DOI
Intelligent Systems Reference Library 2. Berlin: Springer (ISBN 978-3-642-04738-1/hbk; 978-3-642-26120-6/pbk; 978-3-642-04739-8/ebook). xiv, 206 p. (2010).
PDF BibTeX XML Cite
Full Text: DOI
Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 171-178 (2009).
MSC:  68M99
PDF BibTeX XML Cite
Full Text: DOI
Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 143-154 (2009).
MSC:  68T42 68M10
PDF BibTeX XML Cite
Full Text: DOI
Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 135-142 (2009).
MSC:  68T05 68N99
PDF BibTeX XML Cite
Full Text: DOI
Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 107-120 (2009).
MSC:  68P15 68P25
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type
Reviewing State
all top 5
Author
all top 5
Serial
all top 5
Year of Publication
all top 3
Classification
all top 3
Software