Benutzerdefiniertes Cover
Benutzerdefiniertes Cover
Normale Ansicht MARC ISBD

Cyber Security and Digital Forensics : Select Proceedings of the International Conference, ReDCySec 2023 / edited by Nihar Ranjan Roy, Sudeep Tanwar, Usha Batra

Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Reihen: Lecture Notes in Networks and Systems ; 896Verlag: Singapore : Springer Nature Singapore, 2024Verlag: Singapore : Imprint: Springer, 2024Auflage: 1st ed. 2024Beschreibung: 1 Online-Ressource(XXIV, 657 p. 273 illus., 211 illus. in color.)ISBN:
  • 9789819998111
Schlagwörter: Andere physische Formen: 9789819998104 | 9789819998128 | Erscheint auch als: 9789819998104 Druck-Ausgabe | Erscheint auch als: 9789819998128 Druck-AusgabeDOI: DOI: 10.1007/978-981-99-9811-1Online-Ressourcen: Zusammenfassung: A Modest Approach Toward Cloud Security Hygiene -- A Survey on Path Key Establishment -- Credit Card Fraud Detection using ML Techniques -- Vulnerabilities in Smart contracts of Decentralized Blockchain -- Object Detection using TensorFlow 2 and Amazon Sage Maker -- Multi-Key Fully Homomorphic Encryption Scheme Over Integers -- Hybrid Lightweight Cryptography using AES and ECC for IoT Security -- A Survey: Analysis of Existing Hybrid Cryptographic Techniques -- Cloud based Integrated Real-Time Twitter Grievance Redressal With AWS EC2 and RDS using Machine Learning Approach for Enhanced Security -- Blockchain Based Public Distribution System -- Security Flaw in TCP/IP and Proposed Measures -- Identity Based Designated Verifier Proxy Signature scheme and its Application to Health Care -- Detection of Phishing Link using different Machine Learning Techniques -- Categorizing Tracing Techniques for Network Forensics -- Cloud-Based Object Detection Model using Amazon Rekognition -- Orphanage Channelization System Using Blockchain Technology -- A Review on Quantum key Distribution Protocols, Challenges and Its Applications -- Static Analysis Approach of Malware using Machine Learning -- Chatbot based android application towards security using FCM -- Ensemble Deep Model for Hate Speech Detection -- Accuracy Enhancement For Intrusion Detection Systems Using LSTM Approach -- Cyber Attack Detection Using Machine Learning Technique -- An Investigative study on Security Aspects and Authentication Schemes for Internet of Vehicles.Zusammenfassung: The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry.PPN: PPN: 1883769361Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-ENG | ZDB-2-SXE
Dieser Titel hat keine Exemplare

Powered by Koha