top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data science and security : proceedings of IDSCS 2021 / / editors, Samiksha Shukla [et al.]
Data science and security : proceedings of IDSCS 2021 / / editors, Samiksha Shukla [et al.]
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (xiv, 489 pages)
Disciplina 006.3
Collana Lecture notes in networks and systems
Soggetto topico Artificial intelligence
Computer security
Data mining
Mineria de dades
Seguretat informàtica
Intel·ligència artificial
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-16-4486-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Towards a Knowledge Centric Semantic Approach for Text Summarization -- 1 Introduction -- 2 Related Works -- 3 Proposed Architecture -- 4 Implementation -- 5 Performance Evaluation and Results -- 6 Conclusion -- References -- Detection of Abnormal Red Blood Cells Using Features Dependent on Morphology and Rotation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 3.1 Determine the ROI -- 3.2 Features Determination -- 4 Quality Assessment -- 5 Experimental Results -- 6 Conclusion -- 7 Future Scope -- References -- A Systematic Review of Challenges and Techniques of Privacy-Preserving Machine Learning -- 1 Introduction -- 2 Background -- 2.1 What is Privacy in Machine Learning -- 3 Classification of Machine Learning Attacks -- 3.1 Explicit Attack -- 3.2 Implicit Attack -- 4 Privacy-Preserving Mechanisms -- 4.1 Data Aggregation -- 4.2 Training Phase -- 4.3 Inference Phase -- 5 Privacy-Enhancing Execution Models and Environments -- 5.1 Federated Learning -- 5.2 Split Learning -- 5.3 Trusted Execution Environment -- 6 Comparative Analysis -- 7 Conclusion -- References -- Deep Learning Methods for Intrusion Detection System -- 1 Introduction -- 2 Related Work -- 3 Proposed Deep Learning Based Intrusion Detection System -- 4 System Implementation -- 4.1 Dataset -- 4.2 Data Preprocessing -- 4.3 Finding Optimal Parameters in DNN -- 4.4 Finding Optimal Parameters in CNN -- 4.5 Classification -- 5 Results -- 6 Conclusion -- References -- Adaptive Neuro Fuzzy Approach for Assessment of Learner's Domain Knowledge -- 1 Introduction -- 2 Literature Review -- 3 Dataset Preparation and ANFIS Model Development -- 4 ANFIS Model: Testing and Validation -- 5 Conclusion -- References -- Comparison of Full Training and Transfer Learning in Deep Learning for Image Classification -- 1 Introduction.
2 Literature Review -- 3 Method -- 3.1 Transfer Learning Approach -- 3.2 Full Training Approach -- 4 Results and Analysis -- 5 Conclusion -- References -- Physical Unclonable Function and OAuth 2.0 Based Secure Authentication Scheme for Internet of Medical Things -- 1 Introduction -- 2 IoMT and Security -- 2.1 IoMT Architecture -- 2.2 Security Attacks -- 2.3 Authentication -- 2.4 PUF -- 2.5 OAuth 2.0 -- 3 Literature Review -- 4 Proposed Model -- 4.1 Proposed Architecture -- 4.2 Algorithm -- 4.3 Enrolment Phase -- 4.4 Authentication Phase -- 4.5 Data Transmission Phase -- 5 Analysis of the Proposed Scheme -- 5.1 Replay Attacks -- 5.2 Impersonation Attacks -- 5.3 Eavesdropping Attacks -- 5.4 Stolen Device -- 6 Conclusion -- References -- Sensitivity Analysis of a Multilayer Perceptron Network for Cervical Cancer Risk Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Sensitivity Analysis -- 3.3 Algorithm -- 4 Results and Discussions -- 4.1 Number of Inputs and Accuracy -- 4.2 Number of Epochs and Accuracy -- 4.3 NNIHL and Accuracy -- 4.4 Performance Comparison -- 5 Conclusions -- References -- Data Encryption and Decryption Techniques Using Line Graphs -- 1 Introduction -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Encryption Algorithm -- 3.2 Decryption Algorithm -- 4 Encryption and Decryption of the Plaintext - `Crypto' -- 4.1 Encryption -- 4.2 Decryption -- 5 Conclusion -- References -- Aerial Image Enhanced by Using Dark Channel Prior and Retinex Algorithms Based on HSV Color Space -- 1 Introduction -- 2 Proposed Method -- 2.1 DCP Algorithm -- 2.2 HSV Color Space -- 2.3 MSR Algorithm -- 2.4 The Combination of Enhancement Compounds -- 3 Determine the Quality Assessment -- 4 Result and Discussion -- 5 Conclusions -- References -- CARPM: Comparative Analysis of Routing Protocols in MANET -- 1 Introduction.
2 Related Work -- 3 Comparative Analysis of Proposed Routing protocol with DSR and AODV and PA-DSR and GC-DSR -- 3.1 Proactive Routing Protocols -- 3.2 Reactive Routing Protocols -- 3.3 Hybrid Routing Protocols -- 4 Challenges or Drawbacks in DSR, AODV and ZRP -- 5 Proposed Green Corridor Protocol -- 5.1 Proposed Model Algorithm Pseudo-code -- 5.2 Results and Discussion -- 6 Conclusion -- References -- Content-Restricted Boltzmann Machines for Diet Recommendation -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- PIREN: Prediction of Intermediary Readers' Emotion from News-Articles -- 1 Introduction -- 2 Literature Survey and Related Works -- 3 Proposed Methodology -- 4 Implementation -- 5 Results and Performance Evaluation -- 6 Conclusion -- References -- Automated Organic Web Harvesting on Web Data for Analytics -- 1 Introduction -- 2 Literature Review -- 3 Overview of Web Scraping System -- 4 The Proposed System -- 5 Experiments and Results -- 6 Conclusion and Future Work -- References -- Convolutional Autoencoder Based Feature Extraction and KNN Classifier for Handwritten MODI Script Character Recognition -- 1 Introduction -- 2 Review of Literature -- 3 Methodology -- 3.1 Feature Extraction -- 3.2 Classification -- 4 Experimental Results -- 5 Conclusion -- References -- ODFWR: An Ontology Driven Framework for Web Service Recommendation -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation and Performance Evaluation -- 5 Conclusions -- References -- Smart Contract Security and Privacy Taxonomy, Tools, and Challenges -- 1 Introduction -- 2 Literature Review -- 3 Taxonomy for Smart Contract Vulnerabilities -- 4 Proposed Taxonomy for Blockchain Smart Contracts -- 4.1 OWASP Risk Rating Methodology -- 4.2 Proposed Taxonomy.
5 Tools and Methods Used for the Testing -- 6 Open Challenges -- 6.1 Universal Taxonomy -- 6.2 AI-Based Security Tools -- 6.3 The Mechanism to Recall Smart Contract -- 6.4 Auditing Tool that can Support More than One Language -- 6.5 Strategy for Testing a Smart Contract -- 7 Future Work and Conclusion -- References -- Heteroskedasticity Analysis During Operational Data Processing of Radio Electronic Systems -- 1 Introduction -- 2 Literature Analysis and Problem Statement -- 3 Models of Diagnostic Variable in the Case of Heteroskedasticity -- 4 Method for Taking into Account Heteroskedasticity During Analysis of the Diagnostic Variable Trend -- 5 Conclusion -- References -- Role of Data Science in the Field of Genomics and Basic Analysis of Raw Genomic Data Using Python -- 1 Introduction -- 2 Literature Review -- 3 Methodology for Analysing Genomic Data Using Python -- 3.1 Experimental Setup -- 4 Results and Discussion -- 5 Recent Findings in the Field of Genomics -- 6 Conclusions -- References -- Automatic Detection of Smoke in Videos Relying on Features Analysis Using RGB and HSV Colour Spaces -- 1 Introduction -- 2 Literature Review -- 3 Suggested Method -- 3.1 Cut the Video into Frames -- 3.2 Important Video Frame Determination -- 3.3 Smoke Detection Depending on the Features -- 4 Accuracy Meters -- 5 Result and Dissection -- 6 Conclusions -- References -- A Comparative Study of the Performance of Gait Recognition Using Gait Energy Image and Shannon's Entropy Image with CNN -- 1 Introduction -- 2 Literature Survey -- 3 Gait and Gait Phases -- 4 Experiments and Results -- 5 Conclusion -- References -- OntoJudy: A Ontology Approach for Content-Based Judicial Recommendation Using Particle Swarm Optimisation and Structural Topic Modelling -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation.
5 Results and Performance Evaluation -- 6 Conclusions -- References -- Classifying Emails into Spam or Ham Using ML Algorithms -- 1 Introduction -- 2 Related Works -- 2.1 Impact of Feature Selection Technique on Email Classification -- 2.2 A Hybrid Algorithm for Malicious Spam Detection in Email through Machine Learning -- 2.3 Study on the Effect of Preprocessing Methods for Spam Email Detection -- 2.4 Review Web Spam Detection Using Data Mining -- 2.5 Machine Learning-Based Spam Email Detection -- 3 Methodology -- 3.1 Naive Bayes -- 3.2 Support Vector Machine (SVMs) -- 3.3 Random Forest -- 3.4 Decision Tree -- 4 Experiment and Result Analysis -- 4.1 Dataset -- 5 Conclusion -- References -- Rice Yield Forecasting in West Bengal Using Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 ARIMA Model -- 3.3 ANN Model -- 3.4 Hybrid Model -- 3.5 Performance Metrics -- 4 Experiments -- 5 Conclusion and Future Work -- References -- An Inventory Model for Growing Items with Deterioration and Trade Credit -- 1 Introduction -- 2 Modal Formation, Notations and Assumptions -- 3 Analysis -- 4 Particular Case -- 5 Solution Procedure -- 6 Sensitivity Analysis -- 7 Conclusion -- References -- A Deep Learning Based Approach for Classification of News as Real or Fake -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experiment Analysis -- 4.1 Data Pre-processing -- 4.2 Model Analysis -- 4.3 Experimental Result -- 5 Conclusion and Future Aspects -- References -- User Authentication with Graphical Passwords using Hybrid Images and Hash Function -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Algorithm -- 4 Working Example -- 4.1 Registration Process -- 4.2 Login Process -- 5 Security Analysis -- 6 Conclusion and Future Work -- References.
UAS Cyber Security Hazards Analysis and Approach to Qualitative Assessment.
Record Nr. UNINA-9910495223403321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Transformation, Cyber Security and Resilience of Modern Societies / / edited by Todor Tagarev, Krassimir T. Atanassov, Vyacheslav Kharchenko, Janusz Kacprzyk
Digital Transformation, Cyber Security and Resilience of Modern Societies / / edited by Todor Tagarev, Krassimir T. Atanassov, Vyacheslav Kharchenko, Janusz Kacprzyk
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (483 pages) : illustrations
Disciplina 005.8
Collana Studies in Big Data
Soggetto topico Engineering - Data processing
Cooperating objects (Computer systems)
Computational intelligence
Big data
Data Engineering
Cyber-Physical Systems
Computational Intelligence
Big Data
Seguretat informàtica
Protecció de dades
Seguretat de les xarxes d'ordinadors
Dades massives
Computació en núvol
Soggetto genere / forma Llibres electrònics
ISBN 3-030-65722-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Insight into Multi-domain Command and Control Systems: Issues and Challenges -- Cloud Technologies for Building a System of Data Centres for Defence and Security -- Methodology for Organizational Design of Cyber Research Networks -- Managing Cyber-education Environments with Serverless Computing -- Unified Innovative Platform for Administration and Automated Management of Internationally Recognized Standards -- Digitalization and Cyber Resilience Model for the Bulgarian Academy of Sciences.
Record Nr. UNINA-9910483573303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electric mobility in public transport--driving towards cleaner air / / editors, Krzysztof Krawiec, Sylwester Markusik, Grzegorz Sierpinski
Electric mobility in public transport--driving towards cleaner air / / editors, Krzysztof Krawiec, Sylwester Markusik, Grzegorz Sierpinski
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (viii, 216 pages) : illustrations (some color)
Disciplina 388.3493
Collana Lecture notes in intelligent transportation and infrastructure
Soggetto topico Transportation - Technological innovations
Transportation and state
Buses, Electric
Vehicles elèctrics
Transport públic
Autobusos
Política de transports
Seguretat informàtica
Soggetto genere / forma Llibres electrònics
ISBN 3-030-67431-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483687103321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging technologies in data mining and information security . Volume 3 : Proceedings of IEMIS 2020 ; Kolkata, India ; July 2020. / / editors, João Manuel R. S. Tavares [et al.]
Emerging technologies in data mining and information security . Volume 3 : Proceedings of IEMIS 2020 ; Kolkata, India ; July 2020. / / editors, João Manuel R. S. Tavares [et al.]
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (973 pages)
Disciplina 006.3
Collana Lecture notes in networks and systems
Soggetto topico Computer security
Data mining
Dades massives
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-15-9774-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483313703321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging technologies in data mining and information security . Volume 2 : proceedings of IEMIS 2020 / / Aboul Ella Hassanien [and four others], editors
Emerging technologies in data mining and information security . Volume 2 : proceedings of IEMIS 2020 / / Aboul Ella Hassanien [and four others], editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (888 pages)
Disciplina 006.3
Collana Advances in intelligent systems and computing
Soggetto topico Data mining
Dades massives
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-334-367-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483950303321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging technologies in data mining and information security Proceedings of IEMIS 2020 . Volume 1 / / Aboul Ella Hassanien [and four others], editors
Emerging technologies in data mining and information security Proceedings of IEMIS 2020 . Volume 1 / / Aboul Ella Hassanien [and four others], editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (972 pages)
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Data mining
Computer security
Dades massives
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-15-9927-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 498518_1_En_OFC -- 498518_1_En_BookFrontmatter_OnlinePDF -- Preface -- Contents -- About the Editors -- 498518_1_En_1_PartFrontmatter_OnlinePDF -- Computational Intelligence -- 498518_1_En_1_Chapter_OnlinePDF -- Mathematical Modelling and Analysis of Walters Liquid Motion with Brownian Diffusion -- 1 Introduction -- 2 Mathematical Formulation -- 3 Method of Solution -- 4 Results and Discussion -- 5 Conclusion -- References -- 498518_1_En_2_Chapter_OnlinePDF -- Modelling of Two-Phase Fluid Flow Over a Stretching Sheet and Its Numerical Investigation -- 1 Introduction -- 2 Mathematical Formulation of the Problem -- 3 Method of Solution -- 4 Results and Discussion -- 5 Conclusions -- 6 Nomenclature -- References -- 498518_1_En_3_Chapter_OnlinePDF -- Boundary Layer Flow and Its Dual Solutions Over a Stretching Cylinder: Stability Analysis -- 1 Introduction -- 2 Mathematical Formulation -- 3 Stability Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- 498518_1_En_4_Chapter_OnlinePDF -- Towards a Conceptual Modelling of Ontologies -- 1 Introduction -- 2 Related Work -- 3 Conceptual Modelling of Ontology -- 4 Conclusion -- References -- 498518_1_En_5_Chapter_OnlinePDF -- Mathematical Modelling of Power Law Fluid Flow Through a Pipe and Its Rheology -- 1 Introduction -- 2 Mathematical Formulation of the Flow Analysis -- 3 Method of Solution -- 4 Results and Discussion -- 5 Conclusion -- References -- 498518_1_En_6_Chapter_OnlinePDF -- NeurolncRNA: A Database of LncRNAs Associated with Human Neurodegenerative Diseases -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Extraction from Literature -- 2.2 Retrieval of Sequence Information of the lncRNAs -- 2.3 Extraction of Sequence-Based Features of the Collected lncRNAs -- 2.4 Methodology of Development -- 3 Results and Discussion.
3.1 Categorization of lncRNAs and their Literature Details -- 3.2 Different Sequence-Based Features of lncRNAs -- 4 Conclusion and Future Scope -- References -- 498518_1_En_7_Chapter_OnlinePDF -- Affective State Analysis Through Visual and Thermal Image Sequences -- 1 Introduction -- 2 Design of the Experiment -- 3 Emotion Classification -- 3.1 First Network: Face Detection -- 3.2 Second Network: Emotion Classification -- 4 Negative Affect Recognition -- 4.1 Training the HMM -- 4.2 Clustering of Emotion Sequences -- 5 Experimental Results -- 6 Conclusion -- References -- 498518_1_En_8_Chapter_OnlinePDF -- An Ensemble Deep Learning Method for Diabetes Mellitus -- 1 Introduction -- 2 Related Works -- 3 Dataset Description -- 4 Proposed Methodology -- 5 Results and Discussions -- 6 Conclusion and Future Direction -- References -- 498518_1_En_9_Chapter_OnlinePDF -- Memory Fluid Flow Past a Vertical Circular Cylinder and Its Energy Transfer -- 1 Introduction -- 2 Mathematical Formulation -- 3 Method of Solution -- 4 Results and Discussion -- 5 Conclusion -- References -- 498518_1_En_10_Chapter_OnlinePDF -- A Comparative Study on Financial Market Forecasting Using AI: A Case Study on NIFTY -- 1 Introduction -- 2 Preliminaries -- 2.1 Auto-Regressive Integrated Moving Average (ARIMA) -- 2.2 Facebook's PROPHET -- 2.3 Support Vector Regression (SVR) -- 2.4 Recurrent Neural Network (RNN) -- 3 Methodology -- 3.1 Data Pre-processing -- 4 Experimental Approach -- 5 Result Analysis -- 5.1 Root Mean Square Error (RMSE) -- 5.2 Mean Absolute Percentage Error (MAPE) -- 5.3 R2 -- 6 Conclusion -- References -- 498518_1_En_11_Chapter_OnlinePDF -- Hydromagnetic Oscillatory Couette Flow of a Visco-Elastic Fluid with Dust in a Channel with Radiative Heat -- 1 Introduction -- 2 Mathematical Formulation -- 3 Method of Solution -- 4 Results and Discussion -- 5 Conclusion.
References -- 498518_1_En_12_Chapter_OnlinePDF -- Hard Exudates Detection: A Review -- 1 Introduction -- 2 Literature Review -- 3 Conclusion -- References -- 498518_1_En_13_Chapter_OnlinePDF -- Analysis of Visco-elastic Fluid Flow Over an Inclined Cylinder: A Numerical Approach -- 1 Introduction -- 2 Mathematical Formulations -- 3 Method of Solution -- 4 Results and Discussion -- 5 Conclusions -- References -- 498518_1_En_14_Chapter_OnlinePDF -- Convolution Neural Network-Driven Computer Vision System for Identification of Metanil Yellow Adulteration in Turmeric Powder -- 1 Introduction -- 2 Experimentation -- 2.1 Sample Preparation -- 2.2 Image Acquisition -- 2.3 CNN Model -- 3 Results and Discussion -- 4 Conclusion -- References -- 498518_1_En_15_Chapter_OnlinePDF -- Identification of Biologically Relevant Biclusters from Gene Expression Dataset of Duchenne Muscular Dystrophy (DMD) Disease Using Elephant Swarm Water Search Algorithm -- 1 Introduction -- 2 Problem Description -- 2.1 Biclustering -- 2.2 Initial Population -- 2.3 Cost Function -- 3 Proposed Method -- 3.1 Elephant Swarm Water Search Algorithm (ESWSA) -- 3.2 Chaotic Move Elephant Swarm Water Search Algorithm (CM-ESWSA) -- 4 Numerical Experiment -- 4.1 Analysis of the Results on Benchmark Functions -- 4.2 Convergence Analysis -- 4.3 Statistical Testing -- 4.4 Results on Real Life Problem -- 5 Conclusion -- References -- 498518_1_En_16_Chapter_OnlinePDF -- Shadow Detection Using DenseUNet -- 1 Introduction -- 2 A Brief Review of Shadow Detection -- 3 Proposed Method -- 3.1 Intuition -- 3.2 Basic UNet Architecture -- 3.3 DenseUNet Architecture -- 3.4 Preprocessing of Shadow Images -- 3.5 Training -- 4 Results and Discussions -- 4.1 Testing -- 4.2 Comparison to the State of the Art -- 4.3 Failure Cases -- 5 Conclusion -- References -- 498518_1_En_17_Chapter_OnlinePDF.
Map Merging for an Autonomous Multi-robotic System -- 1 Introduction -- 2 Proposed Method -- 2.1 Map-Merging Characteristics and Its Adaptation -- 2.2 The Map-Merging Method -- 3 Map Merging and Degrees of Freedom: A Mathematical Analysis -- 4 Demonstration of the Map-Merging Process -- 5 Conclusion -- References -- 498518_1_En_18_Chapter_OnlinePDF -- On Some Basic Graph Invariants of Unitary Addition Cayley Graph of Gaussian Integers Modulo n -- 1 Introduction -- 2 Preliminaries -- 3 Some Properties of Gaussian Integers -- 4 Clique Number and Chromatic Number of Gn[i] -- 5 Domination Number of Gn[i] -- 6 Conclusion -- References -- 498518_1_En_19_Chapter_OnlinePDF -- A Brief Survey of Token Curated Registries -- 1 Introduction -- 2 TCR and It's Working -- 2.1 Consumers -- 2.2 Candidates -- 2.3 Token Holders -- 2.4 The Incentive System of Token Curated Registries -- 3 Types of TCRs -- 3.1 TCR Classification Based on Design Pattern -- 3.2 TCR Classification Based on Data -- 3.3 TCR Classification Based on Implementation Metrics -- 4 Advantages of TCR -- 5 Applications or Use Cases of TCR -- 5.1 Journalism -- 5.2 Regulatory -- 5.3 Ocean Protocol -- 5.4 Deconet -- 5.5 Advertising -- 5.6 Medical -- 5.7 Userfeeds.io -- 5.8 Mapping -- 5.9 Video -- 5.10 Real Estate -- 5.11 Employment -- 6 TCR'S Open Challenges and Their Existing Solutions -- 6.1 Chicken-Egg Problem -- 6.2 Passive Token Holding/Speculation -- 6.3 Coin-Flipping -- 6.4 Parametric Issues -- 6.5 Order/Ranking in TCRs -- 6.6 Subjective Curation -- 6.7 Economic Attacks -- 6.8 Spam Attack -- 6.9 Registry Poisoning -- 6.10 Real Time Coordination Problem -- 6.11 Publicly Available Data -- 6.12 Nesting of TCRs -- 7 Conclusion and Future Work -- References -- 498518_1_En_20_Chapter_OnlinePDF -- Comparative Study of Effective Augmentation Method for Bangla ASR Using Convolutional Neural Network.
1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Augmentation -- 3.3 CNN Architecture -- 3.4 Linear Predictive Cepstral Coefficients (LPCC) -- 3.5 Mel-Frequency Cepstral Coefficients (MFCC) -- 4 Results and Discussion -- 4.1 Effect of Augmentation in LPCC Model -- 4.2 Effect of Augmentation in MFCC Model -- 4.3 Overall Evaluation -- 5 Conclusion -- References -- 498518_1_En_21_Chapter_OnlinePDF -- A Novel Human Activity Recognition Strategy Using Extreme Learning Machine Algorithm for Smart Health -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Feature Extraction -- 3.2 The Conventional ELM -- 3.3 Proposed Ensemble ELM -- 4 Experimental Setup -- 5 Results -- 6 Conclusion -- References -- 498518_1_En_22_Chapter_OnlinePDF -- Ranking Countries by Perception of Indigenous Companies: A Social Media Rank Metric -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Solution Proposed -- 2 Existing Research -- 3 Data and Resources Used -- 3.1 GADM, the Database of Global Administrative Areas -- 3.2 Forbes Global 2000 -- 3.3 Twitter Search API -- 4 Methodology Adopted -- 4.1 Technologies Used -- 4.2 Obtaining List of Companies Under Consideration from Forbes Global 2000 -- 4.3 Collection of Relevant Tweets -- 4.4 Use of Vader Sentiment Library -- 4.5 Statistical Manipulation and Analysis -- 5 Calculations Done -- 6 Results -- 7 Conclusion -- 8 Shortcomings -- References -- 498518_1_En_23_Chapter_OnlinePDF -- AIDE-AI and IoT-Enabled Home Automation for Disabled and Elderly -- 1 Introduction -- 2 Related Works -- 3 Proposed Design -- 4 Methodology -- 4.1 Glove -- 4.2 Hub -- 4.3 AI Agent -- 4.4 Mobile Application -- 5 Results -- 6 Conclusion -- References -- 498518_1_En_25_Chapter_OnlinePDF.
Synthesizing Uniform Concentric Circular Array Antenna for Minimized Sidelobes Using Teaching-Learning-Based Optimization Algorithm.
Record Nr. UNINA-9910488718203321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations and Applications of Security Analysis [[electronic resource] ] : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers / / edited by Pierpaolo Degano, Luca Viganò
Foundations and Applications of Security Analysis [[electronic resource] ] : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers / / edited by Pierpaolo Degano, Luca Viganò
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 223 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Intel·ligència artificial
Seguretat informàtica
Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Computer communication systems
Algorithms
Computer organization
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Computer Systems Organization and Communication Networks
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-642-03459-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Policy Model for Secure Information Flow -- A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference -- Validating Security Protocols under the General Attacker -- Usage Automata -- Static Detection of Logic Flaws in Service-Oriented Applications -- Improving the Semantics of Imperfect Security -- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data -- Transformations between Cryptographic Protocols -- Formal Validation of OFEPSP+ with AVISPA -- On the Automated Correction of Protocols with Improper Message Encoding -- Finite Models in FOL-Based Crypto-Protocol Verification -- Towards a Type System for Security APIs -- Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption -- How Many Election Officials Does It Take to Change an Election?.
Record Nr. UNISA-996465296903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations and Applications of Security Analysis : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers / / edited by Pierpaolo Degano, Luca Viganò
Foundations and Applications of Security Analysis : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers / / edited by Pierpaolo Degano, Luca Viganò
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 223 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Intel·ligència artificial
Seguretat informàtica
Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Computer communication systems
Algorithms
Computer organization
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Computer Systems Organization and Communication Networks
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-642-03459-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Policy Model for Secure Information Flow -- A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference -- Validating Security Protocols under the General Attacker -- Usage Automata -- Static Detection of Logic Flaws in Service-Oriented Applications -- Improving the Semantics of Imperfect Security -- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data -- Transformations between Cryptographic Protocols -- Formal Validation of OFEPSP+ with AVISPA -- On the Automated Correction of Protocols with Improper Message Encoding -- Finite Models in FOL-Based Crypto-Protocol Verification -- Towards a Type System for Security APIs -- Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption -- How Many Election Officials Does It Take to Change an Election?.
Record Nr. UNINA-9910484158503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Computer organization
Artificial intelligence
Computers
Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Information Systems and Communication Service
Seguretat informàtica
Dades massives
Protecció de dades
Intel·ligència artificial
Soggetto genere / forma Llibres electrònics
ISBN 3-030-38557-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- .
Record Nr. UNISA-996465359103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Computer organization
Artificial intelligence
Computers
Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Information Systems and Communication Service
Seguretat informàtica
Dades massives
Protecció de dades
Intel·ligència artificial
Soggetto genere / forma Llibres electrònics
ISBN 3-030-38557-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- .
Record Nr. UNINA-9910410051603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui