top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Practice and Experience [[electronic resource] ] : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
Information Security Practice and Experience [[electronic resource] ] : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (643 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 3-031-21280-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography.
Record Nr. UNISA-996500062903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
Information Security Practice and Experience : 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings / / edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (643 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 3-031-21280-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography.
Record Nr. UNINA-9910631095103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Data Analytics [[electronic resource] ] : Selected Papers of ICIDA 2022 / / edited by Abhishek Bhattacharya, Soumi Dutta, Paramartha Dutta, Vincenzo Piuri
Innovations in Data Analytics [[electronic resource] ] : Selected Papers of ICIDA 2022 / / edited by Abhishek Bhattacharya, Soumi Dutta, Paramartha Dutta, Vincenzo Piuri
Autore Bhattacharya Abhishek
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (633 pages)
Disciplina 006.3
Altri autori (Persone) DuttaSoumi
DuttaParamartha
PiuriVincenzo
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Quantitative research
Image processing—Digital techniques
Computer vision
Data protection
Telecommunication
Computational Intelligence
Data Analysis and Big Data
Computer Imaging, Vision, Pattern Recognition and Graphics
Data and Information Security
Communications Engineering, Networks
Soggetto non controllato Computer Security
Telecommunication
Engineering
Computers
Technology & Engineering
ISBN 981-9905-50-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Preface -- Contents -- About the Editors -- Computational Intelligence -- Transience in COVID Patients with Comorbidity Issues-A Systematic Review and Meta-Analysis Based on Indian and Southeast Asian Context -- 1 Introduction -- 1.1 Risk of COVID Patients with Comorbidity Issues -- 2 COVID Patient Statistics with Comorbidity Issues -- 3 Research Methodology -- 3.1 Search Strategy -- 4 Related Literature Survey in This Area -- 5 Discussion -- 6 Conclusion and Future Scope -- References -- NFT HUB-The Decentralized Non-Fungible Token Market Place -- 1 Introduction -- 1.1 Non-Fungible Token -- 1.2 Blockchain -- 2 Literature Survey -- 3 Proposed System -- 3.1 Blockchain -- 3.2 Ethereum Blockchain -- 3.3 Properties of Blockchain -- 3.4 Generic Elements of the Blockchain -- 3.5 Secure Hash Algorithm -- 4 Results and Discussion -- 4.1 Deployment Confirmation -- 4.2 Metamask Wallet -- 4.3 Minting Page -- 4.4 Transaction Address -- 4.5 Dashboard -- 5 Conclusion -- 5.1 Future Scope of the Project -- References -- Hashgraph: A Decentralized Security Approach Based on Blockchain with NFT Transactions -- 1 Introduction -- 1.1 Optimized Blockchain Server -- 2 Literature Survey -- 2.1 Survey Report: On Token Service -- 2.2 Survey Report: On Main-Net Access -- 2.3 Survey Report: Remove Centralized Control: Hala Systems -- 3 Proposed System -- 3.1 Non-Fungible Transaction -- 3.2 Blockchain Methodology -- 3.3 Gossip Protocol -- 3.4 Hashgraph -- 3.5 Consensus Algorithm [In Gossip Protocol] -- 3.6 HCS Implementation -- 4 Performance Evaluation -- 4.1 Transaction Cost Denomination of Our Network -- 4.2 Transaction Cost of Network on Blockchain NFT -- 5 Result and Discussion -- 6 Conclusion -- References -- Med Card: An Innovative Way to Keep Your Medical Records Handy and Safe -- 1 Introduction -- 1.1 What is Blockchain?.
1.2 What is Machine Learning? -- 2 Literature Review -- 3 Technologies Used -- 3.1 Blockchain in Health Care -- 3.2 Machine Learning in Health Care -- 4 Proposed Idea -- 4.1 What is a Med Card? -- 4.2 Workflow -- 5 Conclusion and Future Scope -- References -- Delta Operator-Based Modelling and Control of High Power Induction Motor Using Novel Chaotic Gorilla Troop Optimizer -- 1 Introduction -- 2 Formulation of the Problem -- 3 New Chaotic Gorilla Troop Optimizer -- 4 Simulation Ouput and Their Analysis -- 5 Conclusions -- References -- An Enhanced Optimize Outlier Detection Using Different Machine Learning Classifier -- 1 Introduction -- 2 Outlier Detection -- 3 Literature Review -- 4 Proposed Methodology -- 5 Simulation Result -- 6 Conclusion -- References -- Prediction of Disease Diagnosis for Smart Healthcare Systems Using Machine Learning Algorithm -- 1 Introduction -- 2 Heart Disease -- 3 Diabetes Mellitus -- 4 Proposed Methodology -- 5 Simulation Results -- 6 Conclusion -- References -- Optimization Accuracy on an Intelligent Approach to Detect Fake News on Twitter Using LSTM Neural Network -- 1 Introduction -- 2 Road Map of Methodology -- 2.1 Data Collection and Filtration -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Feature Selection -- 2.5 Classification -- 3 Proposed Methodology -- 4 Simulation Results -- 5 Conclusion -- References -- Advance Computing -- Mining User Interest Using Bayesian-PMF and Markov Chain Monte Carlo for Personalised Recommendation Systems -- 1 Introduction -- 2 Related Work and Background -- 3 Experimental Methodology -- 3.1 Probabilistic Matrix Factorization (PMF) -- 3.2 Bayesian-PMF with MCMC -- 3.3 Sparsity Reduction -- 3.4 Performance Measure -- 4 Proposed Architecture -- 5 Experimental Outcomes and Investigation -- 5.1 Dataset Description -- 6 Conclusion and Future Work -- References.
Big Data and Its Role in Cybersecurity -- 1 Introduction -- 2 Security Using Big Data -- 2.1 Use of Big Data Analytic (BDA) as Defense Tool -- 2.2 Cybersecurity and Machine Learning -- 3 Cybersecurity Approaches in Big Data -- 4 Research Trends and Challenges -- 4.1 Use of Big Data in Defense -- 4.2 Laws Regulating to Big Data -- 4.3 Distribution of Data for Storage -- 4.4 Security Technique Scalability in the Big Data -- 5 Conclusions -- References -- QR Code-Based Digital Payment System Using Visual Cryptography -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Encryption -- 4.2 AES Algorithm -- 4.3 Decryption -- 5 Result -- 6 Conclusion -- References -- A Study of Different Approaches of Offloading for Mobile Cloud Computing -- 1 Introduction -- 2 Research Method -- 3 Offloading for Mobile Cloud Computing -- 4 Applications Suitable for Offloading in MCC -- 5 Different Offloading Approaches -- 6 Conclusion -- References -- Use of Machine Learning Models for Analyzing the Accuracy of Predicting the Cancerous Diseases -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Models -- 3.1 Logistic Regression -- 3.2 Decision Tree -- 3.3 Random Forest Classifier -- 4 Experiment -- 4.1 Experiment Environment -- 4.2 Breast Cancer Dataset -- 5 Experimental Results -- 6 Conclusion -- References -- Predict Employee Promotion Using Supervised Classification Approaches -- 1 Introduction -- 2 Related Works -- 3 Implementation -- 3.1 Proposed Model -- 3.2 Data Collection -- 3.3 Data Analysis -- 3.4 Engineered Functions -- 3.5 Train-Test-Split -- 3.6 Model Building -- 4 Performance Evaluation -- 5 Conclusion -- References -- Smart Grid Analytics-Analyzing and Identifying Power Distribution Losses with the Help of Efficient Data Regression Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results.
5 Conclusion -- References -- Load Balancing on Cloud Using Genetic Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusions and Future Work -- References -- Network Security and Telecommunication -- Hybrid Feature Selection Approach to Classify IoT Network Traffic for Intrusion Detection System -- 1 Introduction -- 2 Literature Survey -- 3 Research Gaps -- 4 Proposed Work -- 4.1 Proposed Methodology -- 5 Experimental Results -- 5.1 Dataset Description -- 5.2 System Configuration -- 5.3 Model Parameters -- 5.4 Performance Parameters -- 6 Conclusion -- References -- A Deep Learning-Based Framework for Analyzing Stress Factors Among Working Women -- 1 Introduction -- 2 Literature Survey -- 3 Stress Factors (Stressors) -- 3.1 Deep Learning: Background -- 3.2 Deep Learning-Based Framework for Early Stress Detection -- 4 Results and Discussion -- 5 Conclusion -- References -- Automatic Question Generation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Methodology -- 5 Conclusion and Future Scope -- References -- Automatic Construction of Named Entity Corpus for Adverse Drug Reaction Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Biomedical Named Entity Recognition -- 2.2 Datasets for Biomedical Entity Recognition -- 3 Proposed Work -- 3.1 ADR Corpus Overview -- 3.2 Corpus Construction Steps -- 4 Results -- 4.1 Contributions -- 4.2 Statistics -- 5 Discussion -- References -- A Space Efficient Metadata Structure for Ranking Subset Sums -- 1 Introduction -- 1.1 Problem Formulation -- 1.2 Past Work -- 1.3 Our Contribution -- 2 Outline of Our Technique -- 3 Generation of Top-kk Subsets -- 3.1 The Metadata Structure upper GG -- 3.2 Construction of Metadata Structure upper GG -- 3.3 Query Answering with Heap -- 3.4 Modified Metadata Structure upper GG -- 3.5 The Final Structure of upper GG.
3.6 Generation of Top-kk Subsets by upper GG on Demand -- 3.7 Getting Rid of the Bit String -- 4 Experimental Results -- 4.1 Analysis of the Results -- 5 Conclusion -- References -- Brain Tumour Detection Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Materials -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Implementation of a Smart Patient Health Tracking and Monitoring System Based on IoT and Wireless Technology -- 1 Overview -- 2 Block Diagram -- 3 Methodology and Results -- 3.1 Database Tracking and Maintenance -- 4 Conclusion and Future Scope -- References -- Diabetes Disease Prediction Using KNN -- 1 Introduction -- 2 Literature Survey -- 2.1 How is Data Science Revolutionizing the Healthcare Industry? -- 2.2 Role of Data Science in Health Care -- 2.3 Diabetes Detection Using Data Science -- 2.4 Flow of the Methodology Used for Diabetes Detection -- 3 Proposed System -- 4 Results -- 4.1 Experimental Results -- 4.2 Visualization of Obtained Results -- 5 Conclusion -- 6 Future Scope -- References -- Review: Application of Internet of Things (IoT) for Vehicle Simulation System -- 1 Introduction -- 2 Application -- 3 Basic Concepts of IoT -- 4 Simulation Concept -- 5 Simulation-Based Internet of Things -- 6 Application of Simulated IoT for System Used in Vehicle -- 7 Car Simulation Structure and Principle -- 8 Embedding Security Features in a Vehicle Using IoT -- 9 Conclusion and Future Scope -- References -- Data Science and Data Analytics -- Time Series Analysis and Forecast Accuracy Comparison of Models Using RMSE-Artificial Neural Networks -- 1 Introduction -- 2 Related Research -- 3 Neural Networks Models in Time Series -- 3.1 Feed-Forward Neural Network Model -- 3.2 Time-Lagged Neural Networks -- 3.3 Seasonal Artificial Neural Networks -- 3.4 Long Short-Term Memory (LSTM).
4 Time Series Analysis.
Record Nr. UNINA-9910728933703321
Bhattacharya Abhishek  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent and Interactive Computing [[electronic resource] ] : Proceedings of IIC 2018 / / edited by Vincenzo Piuri, Valentina Emilia Balas, Samarjeet Borah, Sharifah Sakinah Syed Ahmad
Intelligent and Interactive Computing [[electronic resource] ] : Proceedings of IIC 2018 / / edited by Vincenzo Piuri, Valentina Emilia Balas, Samarjeet Borah, Sharifah Sakinah Syed Ahmad
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIV, 569 p. 228 illus., 155 illus. in color.)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Quantum computers
Computer simulation
Computational Intelligence
Artificial Intelligence
Quantum Computing
Simulation and Modeling
ISBN 981-13-6031-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Proposed Framework: Enhanced Automated Duplication Algorithm for Flash Application -- Publication Model for Academic Talent Based On Apriori Technique -- Software Module Clustering based on the Fuzzy Adaptive Teaching Learning based Optimization Algorithm -- Dynamic Solution Probability Acceptance within the Flower Pollination Algorithm for t-way Test Suite Generation -- A Study on Gamification for Higher Education Students' Engagement Towards Education 4.0 -- An Investigation of Learner Characteristics that Use Massive Open Online Courses (MOOC) in Learning Second Language -- Improved Ozone Pollution Prediction using Extreme Learning Machine with Tribas Regularization Activation Function -- Cultural Metadata Enhancement by Using Community-driven Approach to Create Digital Holistic Culture Conservation System -- Tracking Coastal Change over Kuala Terengganu using Landsat -- A Design of Automated Surgical Illumination System -- Image Spam Detection on Instagram using Convolutional Neural Network -- A Review of Botnet Detection Approaches Based on DNS Traffic Analysis -- Face Recognition using Texture Features and Multi-Layer Perceptron -- Classification of Landsat 8 Satellite Data Using Unsupervised Methods.
Record Nr. UNINA-9910483006303321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning Systems: From Theory to Practice / / edited by Vassil Sgurev, Vincenzo Piuri, Vladimir Jotsov
Learning Systems: From Theory to Practice / / edited by Vassil Sgurev, Vincenzo Piuri, Vladimir Jotsov
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 301 p.)
Disciplina 006.31
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-319-75181-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From von Neumann architecture and Atanasoff’s ABC to Neuro-morphic Computation and Kasabov’s NeuCube: Principles and Implementations -- Applications of Computational Intelligence in Industrial and Environmental Scenarios -- Real, Imaginary and Complex Sets -- Intercriteria analysis over patterns -- From Primary to Conventional Science -- Intelligent Two-Level Optimization and Model Predictive Control of Degrading Plants -- Collaborative Clustering: New Perspective to Rank Factor Granules -- Learning through Contstraint Applications -- Autonomous Flight Control and Precise Gestural Positioning of a Small Quadrotor -- Introduction to the Theory of Randomized Machine Learning -- Grid-Type Fuzzy Models for Performance Evaluation and Condition Monitoring of Photovoltaic Systems -- Intelligent Control of Uncertain Switched Nonlinear Plants: NFG Optimum Control Synthesis via Switched Fuzzy Time-delay Systems -- Multidimensional Intuitionistic Fuzzy Quantifiers and Level Operators -- Data Processing and Harmonization for Intelligent Transportation Systems. An Application Scenario on Highway Traffic Flows.
Record Nr. UNINA-9910299952103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine learning in information and communication technology : proceedings of ICICT 2021, SMIT / / Hiren Kumar Deva Sarma, Vincenzo Piuri and Arun Kumar Pujari, editors
Machine learning in information and communication technology : proceedings of ICICT 2021, SMIT / / Hiren Kumar Deva Sarma, Vincenzo Piuri and Arun Kumar Pujari, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (337 pages)
Disciplina 004.6
Collana Lecture notes in networks and systems
Soggetto topico Computer networks
Computer security
Image processing - Digital techniques
ISBN 981-19-5090-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Healthcare Informatics -- Earth Mover's Distance-Based Automated Disease Tagging of Indian ECGs -- 1 Introduction -- 2 Literature Review -- 2.1 Earth Mover's Distance -- 2.2 Various Distances -- 3 Statistics of ECG Training and Test Data Set -- 3.1 Data Set -- 3.2 EMD-Based Analysis of Training Data -- 3.3 ECG Tagging with EMD -- 3.4 Algorithmic Framework Setup -- 4 Conclusion -- References -- Cardial Disease Prediction in Multi-variant Systems Using MT-MrSBC Model -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 System Architecture -- 5 Experimental Approach -- 6 Future Works -- 7 Conclusion -- References -- SVM-based Pre- and Post-treatment Cancer Segmentation from Lung and Abdominal CT Images via Neighborhood-Influenced Features -- 1 Introduction -- 2 Proposed Work -- 2.1 Feature Extraction -- 2.2 Model Building and Validation -- 3 Experiments and Results -- 3.1 Description of Image Dataset -- 3.2 Results -- 4 Performance Analysis -- 5 Conclusion -- References -- Blood Cancer Detection with Microscopic Images Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Simulation Results -- 5 Conclusion -- References -- A Survey on Machine Learning-Based Approaches for Leukaemia Detection -- 1 Introduction -- 1.1 Classification of Leukaemia -- 2 Literature Survey -- 3 Methodology -- 4 Result and Analysis -- 5 Conclusion -- References -- Periocular Region Recognition-A Brief Survey -- 1 Introduction -- 2 Biometric System of Periocular Region Recognition -- 3 Benchmark Dataset for Periocular Recognition -- 4 Detection and Segmentation of the Periocular Region -- 5 Feature Descriptors of Periocular -- 5.1 Global Features -- 5.2 Local Features -- 6 Conclusion and Future Scope for Research -- References.
A Bibliometric Analysis on the Relationship Between Emotional Intelligence, Self-Management and Health Information Seeking -- 1 Introduction -- 2 Discussion -- 3 Research Methodology -- 3.1 Study Characteristics -- 3.2 Co-citation Analysis -- 4 Conclusion -- References -- Preferences in the Detailing Process Among Young and Senior Physicians -- 1 Introduction -- 1.1 Contributions Made in the Paper -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Non-cognitive Differences on Social Media Branded Drugs Promotion: Study of Indian Patients and Physicians -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Data -- 4 Result -- 5 Discussion -- 6 Conclusion -- References -- AUTCD-Net: An Automated Framework for Efficient Covid-19 Diagnosis on Computed Tomography Scans -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset -- 2.2 Proposed Architecture -- 3 Experimentation -- 4 Conclusion -- References -- Computer-Aided Detection of Brain Midline Using CT Images -- 1 Introduction -- 2 Methodology -- 2.1 Slice Selection -- 2.2 Soft Tissues Segmentation -- 2.3 Control Point Estimation -- 3 Results and Comparison -- 4 Conclusion -- References -- Deep Neural Network-Based Classification of ASD and Neurotypical Subjects Using Functional Connectivity Features Derived from Resting-State fMRI Data -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 3 Feature Extraction -- 3.1 Tools -- 3.2 Model -- 4 Result and Discussion -- 5 Conclusion -- References -- Application of Deep Learning in Healthcare -- 1 Introduction -- 2 Literature Survey -- 3 Complete Framework Details -- 4 Proposed Deep Learning Classification Model -- 4.1 Dataset Description -- 4.2 Steps Involved -- 5 Results -- 6 Conclusion and Future Scope -- References -- Recommendation Systems.
A Popularity-Based Recommendation System Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References -- Machine Learning-Based Movies and Shows Recommendation System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Communication Networks -- A Survey on Application of LSTM as a Deep Learning Approach in Traffic Classification for SDN -- 1 Introduction -- 2 Related Works -- 3 Deep Learning for Traffic Classification in SDN -- 4 Long Short-Term Memory: An Overview -- 5 LSTM Application -- 6 LSTM-Based Traffic Classification in SDN -- 7 A Summary of the Methods and Limitations -- 8 Future Works -- 9 Conclusion -- References -- Assistive Technology -- A Novel Low-cost Visual Aid System for the Completely Blind People -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Simulation Results -- 5 Conclusion -- References -- Social Networks -- Twitter Sentiment Analysis Using Machine Learning Techniques: A Case Study Based on Farmers Protest -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Results -- 5 Conclusion -- References -- Sentiment Analysis to Find Sentence Polarity on Tweet Data -- 1 Introduction -- 2 Literature Survey -- 3 Motivation -- 4 Methodology -- 5 Implementation -- 6 Results and Discussion -- 7 Conclusion and Future Scope -- References -- Impact of Emotional Support and Medical Adherence on Social Media Branded Drug Promotion -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Data -- 4 Conclusion and Future Scope -- References -- Image and Video Processing -- A Survey on Video Description and Summarization Using Deep Learning-Based Methods -- 1 Introduction -- 2 Related Work -- 3 Existing Methodology & -- Implementation -- 4 Datasets.
5 Benchmark Results -- 6 Future Directions -- 7 Conclusion -- References -- Aerial Image Classification Using Convolution Neural Network -- 1 Introduction -- 2 CNN for Image Classification -- 2.1 Choice of GoogLeNet -- 2.2 Layers of GoogLeNet -- 2.3 Inception Modules of GoogLeNet -- 3 Transfer Learning -- 3.1 Layer Modification, Network Retraining and Testing -- 3.2 Overfitting and Its Challenges -- 4 The Experiment -- 4.1 Experimental Protocol for Data Acquisition -- 4.2 Dataset Processing -- 4.3 Network Model Preparation -- 4.4 Training -- 4.5 Testing -- 4.6 Result -- 5 Challenges in Image Classification of Aerial Images for Object Detection -- 6 Conclusion -- References -- Image Retrieval Using Neural Networks for Word Image Spotting-A Review -- 1 Introduction -- 2 CBIR Framework -- 3 Low-Level Features -- 3.1 Color Feature -- 3.2 Texture Feature -- 3.3 Shape Feature -- 4 Similarity Matching in CBIR -- 4.1 Euclidean Distance (ED) -- 4.2 Manhattan Distance (MD) -- 4.3 Chebyshev Distance (CD) -- 4.4 Mahalanobis Distance (MahD) -- 5 Machine Learning in CBIR -- 5.1 Supervised Learning Models -- 5.2 Unsupervised Learning Models -- 6 Neural Networks in CBIR -- 6.1 Types of Neural Network -- 6.2 Deep Learning -- 6.3 Neural Network and Deep Learning-Based Approaches for Word Image Spotting -- 7 Discussions and Future Trends -- 8 Conclusion -- References -- Cybersecurity -- Priority-Based Mitigation in Education Sector using Machine Learning -- 1 Introduction -- 2 Risk Mitigation -- 3 Proposed Work -- 4 Conclusion and Discussion -- References -- Miscellaneous Applications -- Prediction and Analysis of Air Quality Index Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Area of Investigation and Datasets -- 3.2 Pattern Recognition Methods -- 4 Results and Discussion -- 5 Conclusion -- References.
A Short Overview on Various Bio-Inspired Algorithms -- 1 Introduction -- 1.1 Artificial Bee Colony (ABC) Algorithm -- 1.2 Fish Swarm Algorithm (FSA) -- 1.3 Cat Swarm Optimization (CSO) -- 1.4 Whale Optimization Algorithm (WOA) -- 1.5 Artificial Algae Algorithm (AAA) -- 1.6 Elephant Search Algorithm (ESA) -- 1.7 Chicken Swarm Optimization Algorithm (CSOA) -- 1.8 Moth Flame Optimization (MFO) -- 1.9 Grey Wolf Optimization (GWO) -- 1.10 Firefly Optimization (FFO) -- 2 Conclusion -- References -- Gesture-Based Drawing Application: A Survey -- 1 Introduction -- 2 Literature Survey -- 3 Methodologies -- 4 Conclusion -- References -- Simulation and Modeling of Electrical Load Data Using Machine Learning -- 1 Introduction -- 2 Simulation and Modeling of the Data -- 2.1 Generalized Linear Model -- 2.2 Decision Tree Model -- 2.3 Random Forest Model -- 2.4 Gradient Boosted Trees Model -- 3 Result and Discussion -- 4 Conclusion -- References -- Analysis of Single Missing Gate Faults in Quantum Circuit -- 1 Introduction -- 2 Background -- 2.1 Quantum Computing (QC) -- 2.2 Quantum Gates and Circuit -- 2.3 Faults in Quantum Circuit -- 2.4 Related Works -- 3 Proposed Methodology -- 3.1 Probability Distribution -- 3.2 Detection of Fault -- 4 Experimental Analysis -- 5 Conclusion -- References -- Experimental Validation of Frequency Scaling Over Indian Hilly Region -- 1 Introduction -- 2 Collection of Data -- 3 Methodology -- 4 Result -- 5 Summary/Conclusion -- References -- School Uniform Identification Using Deep Learning Based Approach -- 1 Introduction -- 2 Related Work -- 3 School Uniform Identification Using Deep Learning Based Approach -- 3.1 System Architecture -- 3.2 Implementation -- 4 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910624320303321
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Multi-Strategy Learning Environment : Proceedings of ICMSLE 2024
Multi-Strategy Learning Environment : Proceedings of ICMSLE 2024
Autore Vimal Vrince
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (710 pages)
Altri autori (Persone) PerikosIsidoros
MukherjeeAmrit
PiuriVincenzo
Collana Algorithms for Intelligent Systems Series
ISBN 981-9714-88-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- 1 AI Powered Chat Assistant for Trauma Detection from Text and Voice Conversations with a Direct Doctor Connection -- 1 Introduction -- 2 Related Works -- 2.1 Emotional Intelligence in Communication: Research Challenges, Literature and Recent Achievements -- 2.2 Chatbot Mobile Isolation App for Depression -- 2.3 Mental Health Chatbot that Uses NLP and AI to Deliver Behavioral Insights and Remote Healthcare -- 2.4 Mental Health Support Chatbot Using NLP -- 2.5 Dost-Chatbot as Mental Health Assistant -- 2.6 Application of Cognitive Behavioral Therapy in Psychiatry: A Review -- 2.7 Revivify: Depression Research and Management Using Automated Tweets and Chatbots -- 2.8 Proposed Chatbot: Thinking and Problem-Solving Experience -- 2.9 Psykh, the Chatbot Using the Rasa Open Source Framework, to be Your Therapist and Stress Reliever -- 2.10 Identify Depression in a Person Using Speech Signals by Extracting Energy and Situations -- 3 Methodology -- 3.1 Module Description -- 4 Implementation -- 4.1 Implementation of Machine Learning Models -- 4.2 NLP Model Development -- 5 Result and Discussion -- 6 Conclusion -- References -- 2 An Intelligent Car Locating System Based on Arduino for a Massive Parking Place -- 1 Introduction -- 2 Motivation -- 3 Problem Statement -- 4 Project Scope -- 5 Objectives -- 6 Related Study -- 7 Comparison with Other System -- 8 Background Tools and Technology -- 8.1 Software Tools -- 8.2 Arduino Simulator -- 8.3 Hardware Tools -- 9 PCB Design of Intelligent Car Locating System for a Massive Parking Place -- 10 Proposed Model of Smart Car Parking System -- 11 Work Flow Diagram of Smart Car Locating System -- 12 Final Circuit of Intelligent Car Locating System for a Massive Parking Place -- 13 Implementation.
13.1 Final Output of Intelligent Car Locating System for a Massive Parking Place -- 14 Result and Discussion -- 15 Testing and Evaluation -- 15.1 Performance Analysis of IoT-Based Intelligent Car Parking System for Large Parking Lot Using Arduino -- 16 Contribution -- 17 Conclusion -- 18 Future Recommendation -- References -- 3 Electricity Load Forecasting Using LSTM for Household Usage -- 1 Introduction -- 2 Literature Review -- 3 LSTM for Electricity Load Forecasting Methodology -- 3.1 Building Machine-Learning Model -- 3.2 Training ML Model -- 4 Results and Discussions -- 4.1 Electricity Load Prediction Over Different Periods -- 4.2 Error Analysis for Electricity Load Prediction -- 4.3 Comparison with Conventional Methods -- 5 Conclusion -- References -- 4 A Cybersecurity Classification Model for Detecting Cyberattacks -- 1 Introduction -- 2 Literature Survey -- 2.1 Training with Support Vector Machine (SVM) for Cyberattack Detection -- 2.2 Normalization for Removing Noise from Given Datasets -- 2.3 Autoencoders with Cybersecurity -- 3 Dataset Description -- 4 Experimental Results -- 5 Conclusion -- References -- 5 Implementation of Baumann Skin Type Indicator Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Brief Overview of the Fundamental Dichotomies of BSTI -- 4 Proposed Architecture -- 4.1 Machine Learning Model Architecture -- 4.2 Dataset -- 5 Experiments and Results -- 5.1 Results of the InceptionV3 Model -- 5.2 Comparison with Other Deep Learning Techniques -- 6 Conclusion and Future Work -- References -- 6 An On-demand Data Delivery and Secured Platform in Cloud Computing -- 1 Introduction -- 1.1 Methodology -- 2 Literature Survey -- 3 On-demand Data Delivery and Secured Platform (ODDSP) -- 3.1 Quality of Service (QoS) -- 4 Advanced Encryption Standard (AES) for Cloud Data -- 4.1 Performance Metrics.
4.2 Evaluation Results -- 5 Conclusion -- References -- 7 Real-Time Sign Language Interpreter Using MediaPipe, Dynamic Time Warping, and NLP -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Problem Domain -- 3.2 Problem Definition -- 3.3 Problem Statement -- 3.4 Dataset -- 4 Implementation -- 4.1 MediaPipe Detection/Holistic Model -- 4.2 Extract Landmarks -- 4.3 Draw Landmarks -- 4.4 Models -- 4.5 Dynamic Time Warping (DTW) -- 4.6 Sign Prediction -- 4.7 Phrase Generation -- 5 Result -- 6 Discussion -- 7 Conclusion -- References -- 8 A Support Vector Machine Classifier Approach for Predicting Preeclampsia and Gestational Hypertension -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Description of the Dataset -- 3.2 Data Preprocessing -- 3.3 Importance of Using SVM in ML Experiments -- 3.4 Training and Testing Data -- 3.5 Methodology -- 3.6 Selection of Algorithm -- 3.7 Evaluation of the Schemes' Performance -- 4 Results and Discussion -- 5 Conclusion -- References -- 9 Multilingual Communication: NMT-Based On-Call Speech Translation for Indian Languages -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Algorithms -- 3.3 Architecture -- 3.4 Model Training -- 3.5 Evaluation -- 4 Result -- 5 Conclusion -- 6 Future Work -- References -- 10 Brain Tumor Segmentation and Classification Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 2.1 Problem Formulation -- 2.2 Research Gap -- 3 Data and Variables -- 3.1 About Dataset -- 3.2 Variables for Segmentation Model: -- 3.3 Variables for Classification Model: -- 4 Methodology and Model Specifications -- 4.1 Segmentation Model -- 4.2 Classification Model -- 5 Empirical Results -- 5.1 Segmentation Model -- 5.2 Classification Model -- 6 Conclusion -- 7 Future Scope -- References.
11 ACO-Optimized DRL Model for Energy-Efficient Resource Allocation in High-Performance Computing -- 1 Introduction -- 2 Literature Review -- 3 Problem Definition -- 4 Methods -- 4.1 Ant Colony Optimization -- 4.2 DRL for Resource Allocation in HPC -- 5 Proposed Model -- 5.1 ACO-Optimized DRL for Resource Allocation in HPC -- 6 Experimental Analysis -- 6.1 Response Time Analysis -- 6.2 Makespan Analysis -- 6.3 Energy Consumption Analysis -- 7 Conclusion and Future Work -- References -- 12 Business Decision-Making Using Hybrid LSTM for Enhanced Operational Efficiency -- 1 Introduction -- 2 Literature Review -- 3 Problem Definition -- 4 Data Collection -- 4.1 Data Preprocessing -- 5 Hybrid Optimized LSTM Model for Sales Prediction -- 5.1 Loss Function -- 6 Experimental Analysis -- 6.1 Model Training -- 6.2 Forecast Analysis -- 6.3 Performance Analysis -- 7 Conclusion and Future Work -- References -- 13 Unveiling New Horizons in Machine Learning, NLP-Driven Framework for Student Learning Behavior -- 1 Introduction -- 2 Literature Review -- 3 Modeling and Analysis of Student Learning Behavior -- 3.1 Role of Machine Learning in Analyzing the Student Behavior -- 4 Techniques for Modeling Student Learning Behavior -- 4.1 Employing Natural Language Processing -- 4.2 Employing Natural Language Processing -- 5 Conclusion and Scope for Future Work -- References -- 14 Mirror Text Classification from Image Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Input and Preprocessing -- 3.2 Clustering and Sub-clustering -- 3.3 Feature Extraction -- 3.4 Training -- 3.5 Mirror Text Identification -- 4 Results and Discussion -- 5 Conclusion -- References -- 15 Using Deep Learning to Identify Types of Lung Diseases from X-Ray Images -- 1 Introduction -- 2 Objective -- 3 Literature Survey -- 4 Proposed System -- 5 Conclusion.
References -- 16 A Light-Weight Data Storage and Delivery Platform in Cloud Computing -- 1 Introduction -- 1.1 Methodology -- 2 Literature Survey -- 3 Lempel-Ziv-Markov (LZMA) Compression -- 3.1 RSA-KEM (Key Encapsulation Mechanism) -- 3.2 Symmetric-Key Decryption -- 3.3 Dataset Description -- 3.4 Performance Metrics -- 4 Experimental Results -- 5 Conclusion -- References -- 17 Big Data Analytics Security Issues and Solutions in Healthcare -- 1 Introduction -- 2 The Need for Medical Care Analytics for Big Data -- 3 Different Big Data Analytics Phases -- 3.1 Extracting, Data Cleaning, and Data Collection -- 3.2 Integration and Aggregation of Data -- 3.3 Data Model -- 3.4 Data Delivery, Interpretation, and Feedback -- 4 Role-Based Application Security Principles -- 5 Big Data Lifecycle -- 6 Technologies in Use -- 7 Big Data Security Challenge and Solution -- 8 Conclusion -- References -- 18 Framework for Early-Stage Diabetes Mellitus Risk Prediction Using Hybrid Supervised Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Framework -- 4 Experimental Setup -- 4.1 Evaluation Metrics -- 5 Results and Discussion -- 5.1 Prediction Performance of ML Techniques -- 5.2 Optimization of Prediction Accuracy -- 6 Conclusion -- References -- 19 Brain Tumor Classification in MRI Images: A CNN and U-Net Approach -- 1 Introduction -- 2 Proposed Method -- 2.1 Data Collection -- 2.2 Image Preprocessing -- 2.3 Image Segmentation -- 2.4 Feature Extraction -- 2.5 Convolutional Neural Network (CNN) -- 2.6 U-Net Architecture -- 2.7 Callback Functions -- 3 Result and Discussion -- 3.1 Evaluation Metrics -- 3.2 Experimental Analysis and Result -- 3.3 Prediction of Tumor -- 4 Conclusion -- References -- 20 Cross-Modal Text-to-Video Retrieval Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Methodology.
5 Model Implementation and Output.
Record Nr. UNINA-9910864194303321
Vimal Vrince  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Network and System Security [[electronic resource] ] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 540 p. 128 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Computers and civilization
Data and Information Security
Cryptology
Computer Communication Networks
IT Operations
Computers and Society
ISBN 3-319-46298-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
Record Nr. UNISA-996466241303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 540 p. 128 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Computers and civilization
Data and Information Security
Cryptology
Computer Communication Networks
IT Operations
Computers and Society
ISBN 3-319-46298-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
Record Nr. UNINA-9910484501503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of research and applications in artificial intelligence : RAAI 2020 / / edited by Indrajit Pan, Anirban Mukherjee, Vincenzo Piuri
Proceedings of research and applications in artificial intelligence : RAAI 2020 / / edited by Indrajit Pan, Anirban Mukherjee, Vincenzo Piuri
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (350 pages)
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
ISBN 981-16-1543-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484752703321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui