LEADER 04944nam 22007455 450 001 996546832503316 005 20230511103000.0 010 $a981-9922-64-X 024 7 $a10.1007/978-981-99-2264-2 035 $a(CKB)26748210000041 035 $a(MiAaPQ)EBC7248797 035 $a(Au-PeEL)EBL7248797 035 $a(DE-He213)978-981-99-2264-2 035 $a(BIP)089944720 035 $a(PPN)270613722 035 $a(EXLCZ)9926748210000041 100 $a20230511d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $b[electronic resource] $e13th International Conference, ATIS 2022, Manipal, India, December 30?31, 2022, Revised Selected Papers /$fedited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (311 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1804 311 $a9789819922635 320 $aIncludes bibliographical references and index. 327 $aPrivacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson?s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30?31, 2022. The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1804 606 $aData protection 606 $aArtificial intelligence 606 $aComputer networks 606 $aEducation?Data processing 606 $aComputer engineering 606 $aData and Information Security 606 $aArtificial Intelligence 606 $aComputer Communication Networks 606 $aComputers and Education 606 $aComputer Engineering and Networks 610 $aComputer Security 610 $aComputers 615 0$aData protection. 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 0$aEducation?Data processing. 615 0$aComputer engineering. 615 14$aData and Information Security. 615 24$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aComputers and Education. 615 24$aComputer Engineering and Networks. 676 $a005.8 702 $aPrabhu$b Srikanth 702 $aPokhrel$b Shiva Raj 702 $aLi$b Gang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996546832503316 996 $aApplications and Techniques in Information Security$92028776 997 $aUNISA