Computing Science, Communication and Security : 5th International Conference, COMS2 2024, Mehsana, Gujarat, India, February 6-7, 2024, Proceedings
| Computing Science, Communication and Security : 5th International Conference, COMS2 2024, Mehsana, Gujarat, India, February 6-7, 2024, Proceedings |
| Autore | Chaubey Nirbhay |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Cham : , : Springer, , 2025 |
| Descrizione fisica | 1 online resource (441 pages) |
| Altri autori (Persone) |
JhanjhiNoor Zaman
ThampiSabu M ParikhSatyen AminKiran |
| Collana | Communications in Computer and Information Science Series |
| ISBN |
9783031751707
3031751701 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910983297303321 |
Chaubey Nirbhay
|
||
| Cham : , : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber-Physical Systems : Foundations and Techniques
| Cyber-Physical Systems : Foundations and Techniques |
| Autore | Sharma Uzzal |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2022 |
| Descrizione fisica | 1 online resource (340 pages) |
| Altri autori (Persone) |
NandParma
ChatterjeeJyotir Moy JainVishal JhanjhiNoor Zaman SujathaR |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-119-83663-8
1-119-83662-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910585797703321 |
Sharma Uzzal
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybersecurity in the Transportation Industry
| Cybersecurity in the Transportation Industry |
| Autore | Shah Imdad Ali |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2024 |
| Descrizione fisica | 1 online resource (269 pages) |
| Disciplina | 363.287 |
| Altri autori (Persone) | JhanjhiNoor Zaman |
| Soggetto topico |
Transportation - Security measures
Computer security |
| ISBN |
9781394204472
1394204477 9781394204465 1394204469 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgements -- Chapter 1 Cybersecurity Issues and Challenges in Civil Aviation Security -- 1.1 Introduction -- 1.2 Literature Review -- 1.3 Research Methods -- 1.4 Cyber Risk in Aviation -- 1.4.1 Voice (Very High Frequency - VHF) -- 1.4.2 Automatic Dependent Surveillance-Broadcast (ADS-B) -- 1.4.3 Importance of Satellite Navigation (GPS) -- 1.5 Distributed Denial of Service (DDoS) -- 1.5.1 Impact of DDoS on Air Transportation -- 1.6 Discussion -- 1.6.1 Importance of IoT in Civil Aviation -- 1.6.2 Cybersecurity Challenges in Civil Aviation -- 1.7 Conclusion -- 1.8 Future Work -- References -- Chapter 2 Addressing Security Issues and Challenges in Smart Logistics Using Smart Technologies -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Methodology -- 2.4 Evaluation of Logistics and Smart Technologies -- 2.4.1 Connectivity -- 2.4.2 Sensors Collection -- 2.4.3 Data Processing Analysis -- 2.4.4 Automation and Control -- 2.4.5 Remote Monitoring and Management -- 2.5 Transportation Technology's Types -- 2.5.1 Underground Tunneling -- 2.5.2 Aerospace -- 2.5.3 Autonomous Vehicles -- 2.5.4 Last-Mile Robots -- 2.5.5 Electric Vehicles -- 2.6 Transportation Technology in Development -- 2.6.1 Blockchain Technology -- 2.6.2 Autonomous Vehicles -- 2.6.3 Connected Vehicles -- 2.7 Discussion -- 2.8 Conclusion -- 2.9 Future Work -- References -- Chapter 3 Global Navigation Satellite Systems for Logistics: Cybersecurity Issues and Challenges -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Research Methods -- 3.4 Global Navigation Satellite Systems -- 3.4.1 Types of Global Navigation Satellite Systems -- 3.4.2 Global Positioning System (United States) -- 3.4.3 GLONASS (Russia) -- 3.4.4 Galileo (European Union) -- 3.4.5 BeiDou (China) -- 3.4.6 IRNSS (India).
3.5 Overview of Automatic Identification System -- 3.6 Discussion -- 3.7 Conclusion -- 3.8 Future Work -- References -- Chapter 4 Importance of E-Maintenance for Railways Logistic -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Overview of E-Maintenance in Railway in the Context of Security Issues -- 4.3.1 Cyber Security Impact on E-Maintenance -- 4.3.2 Overview of Cyberattack in E-Maintenance -- 4.4 Discussion -- 4.5 Cyberattacks in the Railway in the Context of IoT -- 4.6 Cyberattacks in the Railway Using IoT -- 4.7 Conclusion -- 4.8 Future Work -- References -- Chapter 5 Privacy and Security Challenges in Unmanned Aerial Vehicles (UAVs) -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Methodology -- 5.4 Evaluation of UAV Cybersecurity Issues and Challenges -- 5.5 Security and Privacy Requirements -- 5.6 Discussion -- 5.7 Conclusion -- 5.8 Future Work -- References -- Chapter 6 Intelligent Transportation Systems (ITS): Opportunities and Security Challenges -- 6.1 Introduction -- 6.2 Literature Review -- 6.3 Evaluation of the Intelligence Transportation System -- 6.3.1 Data Collection -- 6.3.2 Data Transmission -- 6.3.3 Data Analysis -- 6.3.4 Traveler Information -- 6.4 Importance of Intelligent Transportation System -- 6.5 Discussion -- 6.6 Conclusion -- 6.7 Future Work -- References -- Chapter 7 IoT-Based Railway Logistics: Security Issues and Challenges -- 7.1 Introduction -- 7.2 Literature Review -- 7.3 Evaluation of IoT in Railway Transportation -- 7.3.1 Role of IoT Applications -- 7.3.2 IoT Applications for Railway Management -- 7.4 Railway Security Issues and Challenges -- 7.5 Discussion -- 7.6 Conclusion -- 7.7 Future Work -- References -- Chapter 8 Emerging Electric Vehicles and Challenges -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Methodology -- 8.3.1 Electric Vehicles and Security Issues. 8.4 Overview of Electric Vehicle Cyber-Physical System -- 8.5 Discussion -- 8.5.1 Vehicle Charging Security Issues -- 8.6 Electric Vehicles (EV) Security Challenges -- 8.6.1 Battery and BMS -- 8.7 Conclusion -- 8.8 Future Work -- References -- Chapter 9 Autonomous Shipping: Security Issues and Challenges -- 9.1 Introduction -- 9.2 Literature Review -- 9.3 Evaluation of Autonomous Shipping -- 9.3.1 Overview of Data Transmission -- 9.3.2 Security Issues and Challenges in Data Transmission -- 9.4 Evaluation of the IoT in Autonomous Shipping -- 9.5 Overview of Cybersecurity in Automation Ship -- 9.6 Cybersecurity Challenges in Automation Ship -- 9.7 Discussion -- 9.8 Conclusion -- 9.9 Future Work -- References -- Chapter 10 IoT-Based Smart Transportation Industry: Security Challenges -- 10.1 Introduction -- 10.2 Literature Review -- 10.3 Evaluation of IoT in the Transportation System -- 10.4 IoT Security Issues and Challenges -- 10.5 Evaluation of IoT Application in Transportation -- 10.6 Discussion -- 10.7 Conclusion -- 10.8 Future Work -- References -- Index -- Also of Interest -- EULA. |
| Record Nr. | UNINA-9911019902603321 |
Shah Imdad Ali
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Proceedings of 3rd International Conference on Mathematical Modeling and Computational Science : ICMMCS 2023 / / edited by Sheng-Lung Peng, Noor Zaman Jhanjhi, Souvik Pal, Fathi Amsaad
| Proceedings of 3rd International Conference on Mathematical Modeling and Computational Science : ICMMCS 2023 / / edited by Sheng-Lung Peng, Noor Zaman Jhanjhi, Souvik Pal, Fathi Amsaad |
| Autore | Peng Sheng-Lung |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (559 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
JhanjhiNoor Zaman
PalSouvik AmsaadFathi |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Artificial intelligence Computer simulation Machine learning Computational Intelligence Artificial Intelligence Computer Modelling Machine Learning |
| ISBN |
9789819936113
981993611X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Neuro-Fuzzy Logic Application in Speech Recognition -- Chapter 2: A Machine Learning Model for Predicting Covid-19 -- Chapter 3: Thyroid Disease Prediction using a Novel Classification Enhancing MLP and Random Forest Algorithms -- Chapter 4: Youtube Sentimental Analysis using a Combined Approach of KNN and K-Means Clustering Algorithm -- Chapter 5: Big Data Analytics: Hybrid Classification in Brain Images using BSO and SVM -- Chapter 6: Breast Cancer Detection using Hybrid Segmentation using FOA and FCM Clustering -- Chapter 7: Hybrid Optimization using CC and PSO in Cryptography Encryption for Medical Images -- Chapter 8: Boundary Element Method for Water Wave Interaction with Semi-circular Porous Wave Barriers Placed over Stepped Seabed -- Chapter 9: Fostering Stem Education Competency for Elementary Education Students at Universities of Pedagogy in Vietnam -- Chapter 10: Blockchain based E-Medical Data Storage for Privacy Protection. etc. |
| Record Nr. | UNINA-9910742500003321 |
Peng Sheng-Lung
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||