Applications and techniques in infor...
ATIS (Conference) (2024 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Applications and techniques in information security = 14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Applications and techniques in information security/ edited by V. S. Shankar Sriram ... [et al.].
    Reminder of title: 14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024 : proceedings /
    remainder title: ATIS 2024
    other author: Shankar Sriram, V. S.
    corporate name: ATIS (Conference)
    Published: Singapore :Springer Nature Singapore : : 2025.,
    Description: xiii, 342 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Security of Emerging Technologies in Computer Networks. -- Advancing Quantum Computing and Cryptography. -- Optical Neural Networks - A Strategy for Secure Quantum Computing. -- Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations. -- Cryptographic Distinguishers through Deep Learning for Lightweight Block Ciphers. -- Detection and Mitigation of Email Phishing. -- Securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence Techniques. -- Design of Image Encryption Technique Using MSE Approach. -- Low Latency Binary Edward Curve Crypto processor for FPGA platforms. -- Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions. -- AI-Driven Cybersecurity: The Role of Machine Learning. -- Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data. -- DDOS Attack Detection in Virtual Machine Using Machine Learning Algorithms. -- An Unsupervised Method for Intrusion Detection using Novel Percentage Split Clustering. -- HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention Mechanisms. -- Silent Threats: Monitoring Insider Risks in Healthcare Sector. -- Advancing Cybersecurity with Deep Learning Techniques. -- Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns. -- Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities. -- Enhancing FGSM Attacks with Genetic Algorithms for Robust Adversarial Examples in Remote Sensing Image Classification Systems. -- GAN-Enhanced Multiclass Malware Classification with Deep Convolutional Networks. -- Securing Connected Systems: IoT, Cloud, and Web Security Strategies. -- IOT Based Locker Access System with MFA Remote Authentication. -- A Secure Authentication Scheme between Edge Devices using HyperGraph Hashing Technique in IoT Environment. -- Enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority System. -- Securing Data in MongoDB: A Framework Using Encryption. -- Handling Sensitive Medical Data - A Differential Privacy enabled Federated Learning Approach. -- Securing your Web Applications: The Power of Bugbite Vulnerability Scanner.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-97-9743-1
    ISBN: 9789819797431
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login