LEADER 05419nam 22006375 450 001 9910983301303321 005 20251225183441.0 010 $a981-9797-43-8 024 7 $a10.1007/978-981-97-9743-1 035 $a(CKB)36527920200041 035 $a(DE-He213)978-981-97-9743-1 035 $a(EXLCZ)9936527920200041 100 $a20241103d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $e14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024, Proceedings /$fedited by V.S. Shankar Sriram, Anila Glory H., Gang Li, Shiva Raj Pokhrel 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (XIII, 342 p. 192 illus., 108 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2306 311 08$a981-9797-42-X 327 $a -- Security of Emerging Technologies in Computer Networks. -- Advancing Quantum Computing and Cryptography. -- Optical Neural Networks ? A Strategy for Secure Quantum Computing. -- Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations. -- Cryptographic Distinguishers through Deep Learning for Lightweight Block Ciphers. -- Detection and Mitigation of Email Phishing. -- Securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence Techniques. -- Design of Image Encryption Technique Using MSE Approach. -- Low Latency Binary Edward Curve Crypto processor for FPGA platforms. -- Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions. -- AI-Driven Cybersecurity: The Role of Machine Learning. -- Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data. -- DDOS Attack Detection in Virtual Machine Using Machine Learning Algorithms. -- An Unsupervised Method for Intrusion Detection using Novel Percentage Split Clustering. -- HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention Mechanisms. -- Silent Threats: Monitoring Insider Risks in Healthcare Sector. -- Advancing Cybersecurity with Deep Learning Techniques. -- Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns. -- Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities. -- Enhancing FGSM Attacks with Genetic Algorithms for Robust Adversarial Examples in Remote Sensing Image Classification Systems. -- GAN-Enhanced Multiclass Malware Classification with Deep Convolutional Networks. -- Securing Connected Systems: IoT, Cloud, and Web Security Strategies. -- IOT Based Locker Access System with MFA Remote Authentication. -- A Secure Authentication Scheme between Edge Devices using HyperGraph Hashing Technique in IoT Environment. -- Enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority System. -- Securing Data in MongoDB: A Framework Using Encryption. -- Handling Sensitive Medical Data ? A Differential Privacy enabled Federated Learning Approach. -- Securing your Web Applications: The Power of Bugbite Vulnerability Scanner. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference, on Applications and Techniques in Information Security, ATIS 2024, held in Tamil Nadu, India, November 22-24, 2024. The 24 full papers presented were carefully reviewed and selected from 149 submissions. The conference focuses on Advancing Quantum Computing and Cryptography; AI-Driven Cybersecurity: The Role of Machine Learning; Advancing Cybersecurity with Deep Learning Techniques; and Securing Connected Systems: IoT, Cloud, and Web Security Strategies. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2306 606 $aData protection 606 $aArtificial intelligence 606 $aComputer networks 606 $aEducation$xData processing 606 $aComputer engineering 606 $aData and Information Security 606 $aArtificial Intelligence 606 $aComputer Communication Networks 606 $aComputers and Education 606 $aComputer Engineering and Networks 615 0$aData protection. 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 0$aEducation$xData processing. 615 0$aComputer engineering. 615 14$aData and Information Security. 615 24$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aComputers and Education. 615 24$aComputer Engineering and Networks. 676 $a005.8 702 $aShankar Sriram$b V.S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aH$b Anila Glory$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Gang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPokhrel$b Shiva Raj$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910983301303321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA