Atjaunināt sīkdatņu piekrišanu

E-grāmata: Applications and Techniques in Information Security: 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

?This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30–31, 2022.

The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
Privacy and Security.- Reinforcement Technique for Classifying Quasi and
Non-Quasi Attributes for Privacy Preservation and Data
Protection.- Non-malleable Codes from Authenticated Encryption in Split-State
Model.- Continuously Non-Malleable Codes from Authenticated Encryptions in
2-Split-State Model.- Deep Learning based Differential Classifier of PRIDE
and RC5.- A Better MixColumns Matrix to AES Against Differential Fault
Analysis Attack.- Variants of Crypto-Jacking Attacks and their detection
techniques.- Comparative Study of Sentiment Analysis on Cyber Security
Related Multi-Sourced Data in Social Media Platforms.- Modified Blowfish
Encryption Algorithm for Wireless Body Area Network.- EyeEncrypt: A
Cyber-Secured Framework for Retinal Image Segmentation.- Cosine Similarity
based Group Movie Recommendation Scheme considering Privacy of
Users.- Enhancing Face Recognition Accuracy using the ED-FFP Extraction
Method and Ensemble Learning for Forensics and Cyber Security.- Intrusion
Detection Using Federated Learning.- Advances in Machine Learning.- A
Comparative Analysis of Classification Algorithms used for predicting
Parkinsons Disease.- Optimization of Cluster based Charging dynamics and
routing of EV using Deep RNN.- Analysis and Prognosis of Water Quality for
River Ganga using Water Quality Index.- Detection of Android Ransomware using
Machine Learning Approach.- Cyber Security and Layering of Medical Data Using
Machine Learning Algorithms.- Analysis on Classification of Handwritten
Devanagari Characters using Deep Learning Models.- Cloud, IoT and Computing
Technologies.- Analysis and Comparison of Different Frontend
Frameworks.- Lightweight Capability-Based Access control for Internet of
Things (IoT).- Securing IoT using blockchain.- Vikas: A Multimodal framework
to Aid in Effective Disaster Management.- Discovery ofRare Itemsets using
Hyper-Linked Data Structure: A Parallel Approach.