LEADER 03568nam 22006135 450 001 9910746294103321 005 20251009082055.0 010 $a9789819950805 010 $a9819950805 024 7 $a10.1007/978-981-99-5080-5 035 $a(CKB)28270017000041 035 $a(MiAaPQ)EBC30749682 035 $a(Au-PeEL)EBL30749682 035 $a(OCoLC)1398569592 035 $a(DE-He213)978-981-99-5080-5 035 $a(EXLCZ)9928270017000041 100 $a20230919d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity and Evolutionary Data Engineering $eSelect Proceedings of the 2nd International Conference, ICCEDE 2022 /$fedited by Raj Jain, Carlos M. Travieso, Sanjeev Kumar 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (377 pages) 225 1 $aLecture Notes in Electrical Engineering,$x1876-1119 ;$v1073 311 08$a9789819950799 327 $aCurrent Status of Challenges in Data Security: A Review -- Cyber Bullying: The growing menace in cyber space with its challenges and solutions -- Hybrid Feature Extraction for Analysis of Network System Security - IDS -- Stranger Trust Architecture: An advancement to Zero Trust Architecture -- Genetic algorithm optimized SVM for DoS Attack Detection in VANETs -- Digital and IoT forensic: Recent trends, methods and challenges -- Cloud Based Occlusion Aware Intrusion Detection System -- Comparative Analysis of Web Application based Encryption Methods -- Linking of Ontologies for Composition of Semantic Web Services using Knowledge Graph -- Fake image dataset generation of Sign Language using GAN -- Analysis of Multimodal Biometric System based on ECG Biometrics -- Performance Analysis of Nature Inspired Optimization based Watermarking Schemes. 330 $aThis book comprises the select proceedings of the 2nd International Conference on Cybersecurity and Evolutionary Data Engineering (ICCEDE 2022). The contents highlight cybersecurity and digital forensics, evolutionary data engineering, and data management for secure contemporary applications. It includes papers on data models, semantics, query language; AI-driven industrial automation, ERP, CRM data security; authentication and access control; cyberspace structure and models; and drone large data filtration, cleansing, and security, among others. This book is of immense interest to researchers in academia and industry working in the fields of electronics and data engineering. 410 0$aLecture Notes in Electrical Engineering,$x1876-1119 ;$v1073 606 $aData protection 606 $aEngineering$xData processing 606 $aCooperating objects (Computer systems) 606 $aData and Information Security 606 $aData Engineering 606 $aCyber-Physical Systems 615 0$aData protection. 615 0$aEngineering$xData processing. 615 0$aCooperating objects (Computer systems) 615 14$aData and Information Security. 615 24$aData Engineering. 615 24$aCyber-Physical Systems. 676 $a005.8 700 $aJain$b Raj$0714720 701 $aTravieso$b Carlos M$01429384 701 $aSanjeev Kumar$01863443 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746294103321 996 $aCybersecurity and Evolutionary Data Engineering$94492967 997 $aUNINA