LEADER 04158nam 22007335 450 001 9911047661703321 005 20251013130501.0 010 $a981-9682-83-5 024 7 $a10.1007/978-981-96-8283-6 035 $a(MiAaPQ)EBC32344486 035 $a(Au-PeEL)EBL32344486 035 $a(CKB)41633857800041 035 $a(DE-He213)978-981-96-8283-6 035 $a(OCoLC)1549524401 035 $a(EXLCZ)9941633857800041 100 $a20251013d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity, Privacy and Data Analytics $eSelect Proceedings of the 3rd International Conference, ISPDA 2024 /$fedited by Udai Pratap Rao, Isabel de la Torre Díez, Andrea Visconti, Pethuru Raj Chelliah 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (487 pages) 225 1 $aLecture Notes in Electrical Engineering,$x1876-1119 ;$v1444 311 08$a981-9682-82-7 327 $aSecurity Technologies for 6G Mobile Systems and Challenges Associated with AI Technologie -- Privacy-Preserving Emotion Detection in Audio Data: Leveraging CNNs and Spectrograms in Encrypted Domains -- Scam Detection in Ethereum Transactions using Kolmogorov-Arnold Networks and Ensemble Models -- An Integrated Approach for Enhancing Internet Security using Squid Proxy Based Whitelisting with Machine Learning -- A Comprehensive Exploration of Trust Management, Assessment, and Prediction in Online Social Networks -- Deepfake Detection in Online Social Networks: A Comprehensive Review for Enhancing Trust and Security -- Few-Shot Skin Cancer Classification using Matching Feature Sets with ResNet-12 -- ICFND: Integrated Classifier Approach to Fake News Detection Using Multiple Algorithms -- Remote Data Attestation using Blockchain for Low-End IoT Devices: Enhancing Security through Trustworthy Verification -- Emerging Approaches of User Authentication using Keystroke Dynamics: A Review -- etc. 330 $aThis book comprises the refereed proceedings of the 3rd International Conference on Security, Privacy and Data Analytics (ISPDA 2024). It covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and more. The volume features novel contributions and the latest developments from researchers in both industry and academia, addressing security, privacy, and data analytics from technological and social perspectives. This book will serve as a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners worldwide. 410 0$aLecture Notes in Electrical Engineering,$x1876-1119 ;$v1444 606 $aData protection 606 $aDatabase management 606 $aComputers 606 $aComputer engineering 606 $aComputer networks 606 $aArtificial intelligence 606 $aData and Information Security 606 $aDatabase Management System 606 $aComputing Milieux 606 $aComputer Engineering and Networks 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aDatabase management. 615 0$aComputers. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aDatabase Management System. 615 24$aComputing Milieux. 615 24$aComputer Engineering and Networks. 615 24$aArtificial Intelligence. 676 $a005.8 700 $aRao$b Udai Pratap$01423729 701 $aTorre Díez$b Isabel de la$01868414 701 $aVisconti$b Andrea$01868415 701 $aRaj$b Pethuru$0786064 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911047661703321 996 $aSecurity, Privacy and Data Analytics$94531071 997 $aUNINA