libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

shankar sriram v.s. (curatore); h. anila glory (curatore); li gang (curatore); pokhrel shiva raj (curatore) - applications and techniques in information security

Applications and Techniques in Information Security 14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024, Proceedings

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
81,98 €
NICEPRICE
77,88 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 11/2024





Trama

This book constitutes the refereed proceedings of the 14th International Conference, on Applications and Techniques in Information Security, ATIS 2024, held in Tamil Nadu, India, November 22-24, 2024.

The 24 full papers presented were carefully reviewed and selected from 149 submissions. The conference focuses on Advancing Quantum Computing and Cryptography; AI-Driven Cybersecurity: The Role of Machine Learning; Advancing Cybersecurity with Deep Learning Techniques; and Securing Connected Systems: IoT, Cloud, and Web Security Strategies.





Sommario

.- Security of Emerging Technologies in Computer Networks.

.- Advancing Quantum Computing and Cryptography.

.- Optical Neural Networks – A Strategy for Secure Quantum Computing.

.- Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations.

.- Cryptographic Distinguishers through Deep Learning for Lightweight Block Ciphers.

.- Detection and Mitigation of Email Phishing.

.- Securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence Techniques.

.- Design of Image Encryption Technique Using MSE Approach.

.- Low Latency Binary Edward Curve Crypto processor for FPGA platforms.

.- Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions.

.- AI-Driven Cybersecurity: The Role of Machine Learning.

.- Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data.

.- DDOS Attack Detection in Virtual Machine Using Machine Learning Algorithms.

.- An Unsupervised Method for Intrusion Detection using Novel Percentage Split Clustering.

.- HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention Mechanisms.

.- Silent Threats: Monitoring Insider Risks in Healthcare Sector.

.- Advancing Cybersecurity with Deep Learning Techniques.

.- Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns.

.- Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities.

.- Enhancing FGSM Attacks with Genetic Algorithms for Robust Adversarial Examples in Remote Sensing Image Classification Systems.

.- GAN-Enhanced Multiclass Malware Classification with Deep Convolutional Networks.

.- Securing Connected Systems: IoT, Cloud, and Web Security Strategies.

.- IOT Based Locker Access System with MFA Remote Authentication.

.- A Secure Authentication Scheme between Edge Devices using HyperGraph Hashing Technique in IoT Environment.

.- Enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority System.

.- Securing Data in MongoDB: A Framework Using Encryption.

.- Handling Sensitive Medical Data – A Differential Privacy enabled Federated Learning Approach.

.- Securing your Web Applications: The Power of Bugbite Vulnerability Scanner.











Altre Informazioni

ISBN:

9789819797424

Condizione: Nuovo
Collana: Communications in Computer and Information Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XIII, 342 p. 192 illus., 108 illus. in color.
Pagine Arabe: 342
Pagine Romane: xiii


Dicono di noi