| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911021964303321 |
|
|
Autore |
Roy Nihar Ranjan |
|
|
Titolo |
Cyber Security and Digital Forensics : Select Proceedings of the 2nd International Conference, ReDCySec 2024 / / edited by Nihar Ranjan Roy, Amit Prakash Singh, Pradeep Kumar, Ajay Kaul |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
9789819632848 |
9789819632831 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (546 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Networks and Systems, , 2367-3389 ; ; 1287 |
|
|
|
|
|
|
Altri autori (Persone) |
|
SinghAmit Prakash |
KumarPradeep |
KaulAjay |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Telecommunication |
Forensic sciences |
Data and Information Security |
Communications Engineering, Networks |
Forensic Science |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats -- Impact of Mobile Node Power Consumption in different Mobility Models on Security -- Cyber Resilience Based Education System -- Enhancing Patient Access and Security: Blockchain-QR Integrated Hospital On Tap System -- Adapting GDPR to the Indian Context – Challenges and Implementation Framework -- Leveraging Machine Learning Algorithms for Enhanced Network Intrusion Detection and Categorization (NIDC) -- A security model for the enhancement of mobile security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book features peer-reviewed papers from the International Conference on Recent Developments in Cyber Security, organized by the Center for Cyber Security and Cryptology. It focuses on key topics such as information privacy and secrecy, cryptography, cyber threat |
|
|
|
|
|
|
|
|
|
|
intelligence and mitigation, cyber-physical systems, quantum cryptography, and blockchain technologies and their applications. This volume is a unique collection of chapters from various disciplines united by a common theme, making it immensely valuable for both academic researchers and industry practitioners. |
|
|
|
|
|
| |