|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910741141303321 |
|
|
Autore |
Rao Udai Pratap |
|
|
Titolo |
Security, Privacy and Data Analytics : Select Proceedings of the 2nd International Conference, ISPDA 2022 / / edited by Udai Pratap Rao, Mamoun Alazab, Bhavesh N. Gohil, Pethuru Raj Chelliah |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (424 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Electrical Engineering, , 1876-1119 ; ; 1049 |
|
|
|
|
|
|
Altri autori (Persone) |
|
AlazabMamoun |
GohilBhavesh N |
ChelliahPethuru Raj |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Database management |
Computers |
Computer engineering |
Computer networks |
Artificial intelligence |
Data and Information Security |
Database Management System |
Computing Milieux |
Computer Engineering and Networks |
Artificial Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Recent Advancements on Energy-Saving LEACH Protocol in Wireless Sensor Network-Review -- Slow TCP Port Scan Detection Using Flow Data.-An Exploration of Digital Forensic Techniques: A Brief Survey -- Personality Based Friends Recommendation System for Social Networks -- Analysis of Different Sampling Techniques for Software Fault Prediction. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2022. The volume covers topics, including big data and analytics, cloud security |
|
|
|
|
|
|
|
|
|
|
and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and many others. The volume includes novel contributions and the latest developments from researchers across industry and academia working in security, privacy, and data analytics from technological and social perspectives. This book will emerge as a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners across the globe. |
|
|
|
|
|
| |