LEADER 05826nam 22008055 450 001 9910986145103321 005 20250307115241.0 010 $a9783031837838 010 $a3031837835 024 7 $a10.1007/978-3-031-83783-8 035 $a(MiAaPQ)EBC31952038 035 $a(Au-PeEL)EBL31952038 035 $a(CKB)37801690600041 035 $a(DE-He213)978-3-031-83783-8 035 $a(OCoLC)1507700691 035 $a(EXLCZ)9937801690600041 100 $a20250307d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Network Technologies and Intelligent Computing $e4th International Conference, ANTIC 2024, Varanasi, India, December 19?21, 2024, Proceedings, Part I /$fedited by Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Rajkumar Buyya, Dipankar Dasgupta 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (616 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2333 311 08$a9783031837821 311 08$a3031837827 327 $a -- Advance Network Technologies. -- Ensuring Advanced ATM Security: A Formal Verification Approach With Event-B. -- Secure Communication in Fog Nodes through Quantum Key Distribution. -- Exploring Efficacy of Cryptographic Hash Functions SHA-256 and Blake2s against HashBoost. -- Deep Reinforcement Learning-Driven Path Optimization in Multi-UAV Edge Computing Systems. -- Decentralized Authentication and Data Security Scheme for IoMT devices and Patients using Blockchain, PUF and IPFS. -- Detection and Mitigation of IoT based DDoS Attack using Extended MUD enabled Device Profiling Techniques. -- Load Balanced Transaction Scheduling using Gaussian mixture model-ant colony optimization. -- Botnet-Based DDoS Attack: Automatic Detection, Mitigation, and Real-Time Traffic Filtering in Cloud Environments. -- Optimizing Cost Overhead in Low TPS Microservices with frequent Writes to Storage with Small Data Size. -- Designing A Smart Healthcare IoT System for Precise Fall Detection in Older Adults Using Multi-Sensor Data Fusion. -- Securing Pharmaceutical Supply Chains with Ethereum Blockchain: A Model for Counterfeit Prevention and Transparency of Drugs. -- A Hybrid Algorithm with Fuzzy Logic for Population Diversity Maintenance of Genetic Algorithm. -- IoT - enabled Tool for Static and Dynamic Analysis of Hand Strength. -- Decentralized Defences from Federated Learning for Ethereum Phishing Detection. -- Maximum Independent Set using Hummingbird Optimization. -- Machine Learning Based Voltage Prediction with Various Levels of pH in IoT Environment. -- Deep Multi-time Visualization and Analytics for E-commerce Platform. -- Lightweight Distributed Ledger Technology and Consensus Algorithms for D2D Communication. -- Evaluating the Effectiveness of Machine Learning Algorithms for Network Intrusion Detection. -- IoT System intrusion detection with XGBoost optimized by modified metaheuristics. -- Spammer Groups Detection in Online Reviews: A Novel Approach Using FP-Growth and Behavioral Features. -- Encoder - Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks. -- Development of Blockchain Integrated Agricultural Land Lease Framework with a Voting-Based Consensus Protocol Using Event-B. -- A Post Quantum Key Policy Attribute Based Encryption Scheme from Code Based Cryptographic Assumptions. -- Edge AI to Edge Robotics: Enhancing Human Pose Estimation with High-Performance TPU Computing. -- Task scheduling in distributed real-time systems using hybrid model based on ACO-GA. -- Enhancing Box Type Solar Cooker Performance with Optimal Reflecting Sidewall Angles using Genetic Algorithm. 330 $aThis book constitutes the refereed proceedings of the 4th International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2024, held in Varanasi, India, during December 19?21, 2024. The 95 full papers and 15 short papers included in this book were carefully reviewed and selected from 507 submissions. They were organized in topical sections as follows: Advance Network Technologies; and Intelligent Computing. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2333 606 $aComputer engineering 606 $aComputer networks 606 $aSoftware engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer Engineering and Networks 606 $aSoftware Engineering 606 $aCryptology 606 $aComputer Communication Networks 606 $aCoding and Information Theory 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aComputer Engineering and Networks. 615 24$aSoftware Engineering. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 676 $a621.39 676 $a004.6 700 $aVerma$b Anshul$01592011 701 $aVerma$b Pradeepika$01765132 701 $aPattanaik$b Kiran Kumar$01765133 701 $aBuyya$b Rajkumar$0722089 701 $aDasgupta$b Dipankar$01064558 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910986145103321 996 $aAdvanced Network Technologies and Intelligent Computing$94327363 997 $aUNINA