Emerging Wireless Communication and Network Technologies : Principle, Paradigm and Performance / / edited by Karm Veer Arya, Robin Singh Bhadoria, Narendra S. Chaudhari |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (IX, 360 p. 124 illus., 79 illus. in color.) |
Disciplina | 004.6 |
Soggetto topico |
Computer communication systems
Electrical engineering Mobile computing Signal processing Image processing Speech processing systems Computer Communication Networks Communications Engineering, Networks Mobile Computing Signal, Image and Speech Processing |
ISBN |
978-981-13-0396-8
981-13-0396-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to Emergence for Wireless Technology and Communications -- Explorations and Trends -- Advancement in Wireless Technologies and Networks -- Cognitive Radio Networks (CRN) Technologies and Applications -- 5G Mobile Communication Systems -- Design and Application for Reliable Cooperative Networks -- Advancement and Future Scope -- Infrastructure in Mobile Opportunistic Networks -- Generic Design and Advances in Wearable Sensor Technology -- Realizing the Wireless Technology in Internet of Things (IoT). |
Record Nr. | UNINA-9910299296403321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Exploring enterprise service bus in the service-oriented architecture paradigm / / Robin Singh Bhadoria, Narendra Chaudhari, Geetam Singh Tomar, and Shailendra Singh, editors |
Pubbl/distr/stampa | Hershey, Pennsylvania : , : IGI Global, , 2017 |
Descrizione fisica | PDFs (378 pages) : illustrations |
Disciplina | 004.654 |
Collana | Advances in Business Information Systems and Analytics (ABISA) Book Series |
Soggetto topico |
Service-oriented architecture (Computer science)
Enterprise application integration (Computer systems) Web services |
Soggetto non controllato |
Cloud computing
Clustering Complex event computing Java business integration Power application system Service-oriented computing Wireless sensor network |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Middleware architecture using SOA system / Praveen Kumar Mudgal, Shailendra Singh, Sanjay Singh Kushwah -- Featured analysis of enterprise service bus / Utkarsh Sharma, Robin Singh Bhadoria, Manish Dixit -- Analytics-as-a-service (AaaS): an elucidation to SOA / Chitresh Verma, Rajiv Pandey -- A role of enterprise service bus in building web services / Dinesh Sharma, Devendra Kumar Mishra -- Analysis of data functionality in enterprise service bus / Aditya Singh Bais, Varun Mishra -- Challenges in securing ESB against web service attacks / Rizwan Ur Rahman, Divya Rishi Sahu, Deepak Singh Tomar -- Securities perspective in ESB-like XML-based attacks: interface abstraction, data privacy, and integrity / Ayush Gupta, Ravinder Verma -- Concept of cloud computing in ESB / Mayank Bhushan, Ankit Yadav -- Service cluster approach in enterprise service bus / Jayashree K, Chithambaramani Ramalingam -- Aspect of ESB with wireless sensor network / Mohit Mittal, Robin Singh Bhadoria -- Web service clustering and data mining in SOA system / Sreeparna Mukherjee, Asoke Nath -- Data analysis for potential reach using elastic search / Nikhil Chaudhari -- Publish/subscribe-based service bus for IoT services / Yang Zhang -- Efficient storage mechanisms for internet of things solutions in ESB / Ivan A. Perl -- Big data analytics with service-oriented architecture / Triparna Mukherjee, Asoke Nath --
Privacy preservation of social media services: graph prospective of social media / Nikhil Kumar Singh, Deepak Singh Tomar -- Service-oriented framework for advance diagnosis of MSMEs turning into NPAs: an Indian perspective / Agnivesh Pandey, Rajiv Pandey -- An essence of the SOA on healthcare / Kanak Saxena, Umesh Banodha -- Towards a middleware based on SOA for ubiquitous care of non-communicable diseases / Henrique Damasceno Vianna [and 3 others] -- Performance of service-oriented architecture (SOA): medical image systems for chronic diseases / Deepika Dubey, Deepanshu Dubey, Uday Pratap Singh. |
Record Nr. | UNINA-9910164874903321 |
Hershey, Pennsylvania : , : IGI Global, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The human element of big data : issues, analytics, and performance / / edited by Geetam Tomar, Narendra S. Chaudhari, Robin Singh Bhadoria, and Ganesh Chandra Deka |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , [2017] |
Descrizione fisica | 1 online resource (364 pages) |
Disciplina | 005.7 |
Soggetto topico |
Big data
Data mining - Social aspects Quantitative research - Social aspects |
Soggetto genere / forma | Electronic books. |
ISBN |
1-315-35107-2
1-315-36806-4 1-4987-5418-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Section I. Introduction to the human element of big data : definition, new trends, and methodologies -- Section II. Algorithms and applications of advancement in big data -- Section III. Future research and scope for the human element of big data -- Section IV. Case studies for the human element of big data : analytics and performance. |
Record Nr. | UNINA-9910148742703321 |
Boca Raton, Fla. : , : CRC Press, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Predictive data security using AI : insights and issues of Blockchain, IoT, and DevOps / / Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria, editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (222 pages) |
Disciplina | 006.3 |
Collana | Studies in computational intelligence |
Soggetto topico |
Artificial intelligence
Computer security |
ISBN | 981-19-6290-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- A Comprehensive Study of Security Aspects in Blockchain -- 1 Introduction -- 2 Characteristics of Blockchain Technology -- 3 Working of Blockchain -- 4 Analysis of Security in Blockchain -- 4.1 Risks to Blockchain -- 4.2 Attacks on Blockchain -- 5 Security Enhancements -- 6 Applications of Blockchain -- 7 Trade-Offs and Challenges of Blockchain Technology -- 8 Conclusion -- References -- An Exploration Analysis of Social Media Security -- 1 Introduction to Social Media Security and Its Evolution -- 2 Important Issues Involving Security for Social Media -- 2.1 Privacy of Data -- 2.2 Data Mining -- 2.3 Virus and Malware Attacks -- 2.4 Legal Issues -- 3 Risks and Challenges of Social Media Security -- 3.1 Information Revelation -- 3.2 Location Spillage -- 3.3 Cyberbullying and Cyberstalking -- 3.4 Cyber Terrorism -- 3.5 Reputation Misfortune -- 3.6 Identity Theft -- 4 Social Media Networks Security Solutions -- 4.1 Watermarking -- 4.2 Steganalysis -- 4.3 Digital Oblivion -- 4.4 Storage Encryption -- 4.5 Detection of Malware and Phishing -- 4.6 Prediction of Cyberattacks Through Monitoring Social Media -- 4.7 Time Lag-Based Modelling for Software Vulnerability Exploitation Process -- 4.8 Session Hijacking Counter Measures -- 4.9 Privacy Set-Up on Social Networking Sites -- 5 Conclusion -- References -- A Pragmatic Analysis of Security Concerns in Cloud, Fog, and Edge Environment -- 1 Introduction to Cloud Computing -- 2 Introduction to Fog Computing -- 3 Introduction to Edge Computing -- 4 Security Threats of Cloud Fog and Edge Computing -- 5 Potential Solution of Cloud Fog and Edge Computing -- 6 Conclusion and Future Scope -- References -- Secure Information and Data Centres: An Exploratory Study -- 1 Introduction -- 1.1 History of Data Centre.
1.2 Importance of Data Centres in a Business Environment -- 2 Core Parts of a Data Centre -- 2.1 Network Infrastructure -- 2.2 Storage Infrastructure -- 2.3 Server Infrastructure -- 2.4 Computing Resources -- 2.5 Categories of Data Centre Facilities -- 3 Requirements of a Modern Data Centre -- 3.1 Abundant, Reliable Power -- 3.2 Cool Conditions -- 3.3 Physical and Virtual Security Measures -- 4 Tiered Data Centres -- 4.1 Uptime Institute -- 5 Challenges in Data centre Networking -- 5.1 Data Security -- 5.2 Power Management -- 5.3 Capacity Planning -- 5.4 The Internet of Things (IoT) -- 5.5 Mobile Enterprise -- 5.6 Real-Time Reporting -- 5.7 Balancing Cost Controls with Efficiency -- 6 Threats Faced by Data Centres in India -- 6.1 Inadequate Cognizance of Assets -- 6.2 Disproportionate Energy Exhaustion -- 6.3 Inefficient Capacity Planning -- 6.4 Unfortunate Staff Productivity -- 6.5 Long Recovery Periods -- 6.6 Growing Security Concerns -- 7 Security Threats of Data Centre -- 7.1 Classes of Data Centre Security -- 7.2 Who Needs Data Centre Security? -- 8 Cybersecurity Threats to Heed -- 8.1 Phishing Engineering Attacks -- 8.2 Ransomware -- 8.3 Cyberattacks Against Hosted Services -- 8.4 IoT-Based Attacks -- 8.5 Internal Attacks -- 8.6 Unpatched Security Susceptibility and Bugs -- 9 How to Keep Data Centre Secure -- 10 How to Curb These Attacks -- 10.1 Secure Your Hardware -- 10.2 Encrypt and Backup Data -- 10.3 Create a Security-Focused Workplace Culture -- 10.4 Invest in Cybersecurity Insurance -- 10.5 Physical Security -- 10.6 Virtual Security -- 11 How to Secure Data Centres Against or After Cyberattacks -- 11.1 Securing Different Regions Through Network Segmentation -- 11.2 Moving Beyond Segmentation to Cyber -- 11.3 Advanced Attacks and Mature Attacks -- 11.4 Behavioural -- 11.5 Preempt the Silos. 12 Checklist to Help with Security Arrangements -- 13 Benefits of Cybersecurity -- 14 Conclusion -- References -- Blockchain-Based Secure E-voting System Using Aadhaar Authentication -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 System Architecture -- 4 Implementation Details -- 5 Security Analysis of Proposed System -- 6 Comparison with Existing Techniques -- 7 Conclusion and Future Scope -- References -- DevOps Tools: Silver Bullet for Software Industry -- 1 Introduction -- 1.1 Background -- 2 DevOps Life Cycle -- 2.1 Continuous Development -- 2.2 Continuous Integration -- 2.3 Continuous Testing -- 2.4 Continuous Deployment -- 2.5 Continuous Monitoring -- 2.6 Continuous Feedback -- 2.7 Continuous Operations -- 3 DevOps Tools -- 3.1 Code -- 3.2 Build -- 3.3 Test -- 3.4 Delivery -- 3.5 Deployment -- 3.6 Monitor -- 4 DevOps in Industry and Education -- 5 Conclusion and Future Perspective -- References -- Robust and Secured Reversible Data Hiding Approach for Medical Image Transmission over Smart Healthcare Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Watermark Embedding and Extraction -- 3.2 Watermark Encryption and Decryption -- 4 Experimental Results and Discussion -- 4.1 Imperceptibility Test -- 4.2 Robustness Test -- 4.3 Security Test -- 4.4 Computational Cost -- 5 Conclusions -- References -- Advancements in Reversible Data Hiding Techniques and Its Applications in Healthcare Sector -- 1 Introduction -- 2 Methods of Secure Communication -- 2.1 Steganography -- 2.2 Reversible Data Hiding (RDH) -- 2.3 Digital Watermarking -- 3 Related Work -- 3.1 Efficiency Parameters -- 3.2 Related Works on Reversible Data Hiding -- 3.3 Related Works on Reversible Watermarking -- 4 Medical Image Datasets for the Research Work -- 5 Research Challenges -- 6 Conclusion -- References -- Security Issues in Deep Learning. 1 Introduction -- 1.1 Implementations of Deep Learning -- 2 Background -- 2.1 Deep Learning -- 2.2 Deep Neural Networks (DNNs) -- 2.3 Artificial Intelligence -- 2.4 DNNs Properties -- 2.5 Strategies for Secrecy for In-Depth Learning -- 3 In-Depth Reading of Private Data Frames -- 3.1 Shokri and Shmatikov -- 3.2 SecureML -- 3.3 Google -- 3.4 CryptoNets -- 3.5 MiniONN -- 3.6 Chameleon -- 3.7 DeepSecure -- 4 Deep Learning Attack -- 4.1 Trained Model -- 4.2 Inputs and Prediction Results -- 5 Attack that Destroys Example -- 5.1 Introduction of Model Extraction Attack -- 5.2 Adversary Model -- 5.3 Alternative Released Information -- 6 Possible Attacks of Example -- 6.1 Introducing the Model Inversion Attack -- 6.2 Suspected Membership Attack -- 7 Poison Attack -- 7.1 Attack Assaults on Ordinary Supervised Analysis (LR) -- 7.2 Poisoning Assaults in Conventional Unsupervised Learning -- 7.3 Poison Attack on Deep Learning -- 7.4 Poison Assault on Strengthening Training -- 8 Adversarial Attack -- 8.1 How to Attack Enemies -- 9 Unlock Problems -- 10 Conclusion -- References -- CNN-Based Models for Image Forgery Detection -- 1 Introduction -- 2 Theoretical Background -- 3 Dataset Description -- 4 Methodology -- 4.1 Data Pre-processing -- 4.2 Training Models -- 4.3 Workflow of the Proposed CNN Model -- 5 Result and Analysis -- 5.1 Hyper-parameters -- 5.2 Pseudocode -- 5.3 Evaluation Metrics -- 5.4 Training and Validation Loss Curve -- 5.5 Confusion Matrix -- 6 Conclusion and Future Scope -- References -- Malicious URL Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Overview of Principles of Detecting Malicious URLs -- 3.1 Blacklisting or Heuristic Approaches -- 3.2 Machine Learning Approaches -- 4 Datasets -- 5 Feature Extraction -- 5.1 URL-Based Lexical Features -- 5.2 DNS-Based Features -- 5.3 Webpage Content-Based Features. 6 Machine Learning Algorithms for Malicious URL Detection -- 7 Practical Issues and Open Problems -- 8 Conclusion -- References. |
Record Nr. | UNINA-9910633913903321 |
Singapore : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|