LEADER 01052nam0-22003011i-450- 001 990000116190403321 035 $a000011619 035 $aFED01000011619 035 $a(Aleph)000011619FED01 035 $a000011619 100 $a20011111d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aUmidità relativa e tensioni di vapore a Milano (Brera) da settanta anni di osservazioni (1880-1949)$erappresentazione statistica dei due fenomeni$fMario Moja. 210 $aParma$cTipografie riunite Donati$d1954 215 $a33 p.$d30 cm 610 0 $aUmidità atmosferica relativa$aMilano$a1880$a1949 610 0 $aEvaporazione atmosferica$aMilano$a1880$a1949 676 $a551.57 700 1$aMoja,$bMario$07490 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000116190403321 952 $a13 N 45 14$b21858$fFINBC 959 $aFINBC 996 $aUmidità relativa e tensioni di vapore a Milano (Brera) da settanta anni di osservazioni (1880-1949$9114730 997 $aUNINA DB $aING01 LEADER 04917nam 22007455 450 001 9910726296103321 005 20251225203731.0 010 $a9789819922642 010 $a981992264X 024 7 $a10.1007/978-981-99-2264-2 035 $a(CKB)26748210000041 035 $a(MiAaPQ)EBC7248797 035 $a(Au-PeEL)EBL7248797 035 $a(DE-He213)978-981-99-2264-2 035 $a(BIP)089944720 035 $a(PPN)270613722 035 $a(MiAaPQ)EBC7248557 035 $a(EXLCZ)9926748210000041 100 $a20230511d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $e13th International Conference, ATIS 2022, Manipal, India, December 30?31, 2022, Revised Selected Papers /$fedited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (311 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1804 311 08$a9789819922635 320 $aIncludes bibliographical references and index. 327 $aPrivacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson?s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery ofRare Itemsets using Hyper-Linked Data Structure: A Parallel Approach. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30?31, 2022. The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1804 606 $aData protection 606 $aArtificial intelligence 606 $aComputer networks 606 $aEducation$xData processing 606 $aComputer engineering 606 $aData and Information Security 606 $aArtificial Intelligence 606 $aComputer Communication Networks 606 $aComputers and Education 606 $aComputer Engineering and Networks 615 0$aData protection. 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 0$aEducation$xData processing. 615 0$aComputer engineering. 615 14$aData and Information Security. 615 24$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aComputers and Education. 615 24$aComputer Engineering and Networks. 676 $a005.8 702 $aPrabhu$b Srikanth 702 $aPokhrel$b Shiva Raj 702 $aLi$b Gang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910726296103321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA