top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Decision Intelligence Solutions : Proceedings of the International Conference on Information Technology, InCITe 2023, Volume 2
Decision Intelligence Solutions : Proceedings of the International Conference on Information Technology, InCITe 2023, Volume 2
Autore Hasteer Nitasha
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (388 pages)
Disciplina 004
Altri autori (Persone) McLooneSeán
KhariManju
SharmaPurushottam
Collana Lecture Notes in Electrical Engineering Series
ISBN 981-9959-94-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Dual Band Open Slot and Notch Loaded Bandwidth Enhanced Microstrip Patch Antenna for IoT/WiMAX/WLAN Applications -- 1 Introduction -- 2 Antenna Design -- 3 Design Specifications and Proposed Geometry -- 4 Procedure of Antenna Design -- 5 Results and Discussion -- 6 Conclusion -- References -- Carbon Nanotubes as Interconnects: A Short Review on Modelling and Optimization -- 1 Introduction -- 2 Literature Reviews on Carbon Interconnect -- 3 Conclusions -- References -- AutoML Based IoT Application for Heart Attack Risk Prediction -- 1 Introduction -- 2 Proposed System Architecture -- 3 Methodology Auto ML -- 4 Results -- 5 Conclusion -- References -- An Overview of Security Issues in IoT-Based Smart Healthcare Systems -- 1 Introduction -- 2 Literature Review -- 3 Discussion -- 3.1 Attacks on Smart Health System's Security -- 3.2 Attack's Classification -- 4 Conclusion -- References -- Continuous Integration and Continuous Deployment (CI/CD) Pipeline for the SaaS Documentation Delivery -- 1 Introduction -- 2 Background of Software Solution Delivery Workflow -- 2.1 Lack of Proper Product Technical Documentation for SaaS Customization -- 3 What is CI/CD Pipeline Approach? -- 3.1 CI/CD Code and Manual Doc Approach -- 3.2 Help as a Service (HaaS) -- 3.3 Measuring Success -- 4 Research Methodology -- 4.1 Requirement Gathering and Analysis -- 5 CI/CD Documentation by Example -- 5.1 Objectives and Key Results -- 5.2 Build Automation Workflow -- 5.3 Configure Build Automation Workflow -- 6 An Experimental Study Using the CI/CD Pipeline -- 6.1 Result of the Testing Exercise -- 7 Conclusions -- References -- Secure & -- Trusted Framework for Cloud Services Recommendation-A Systematic Review -- 1 Introduction -- 2 Related Work.
3 SWOT Analysis of Secure and Trusted Framework (STF) for Cloud Services Recommendations -- 3.1 Strengths of STF -- 3.2 Weakness of STF -- 3.3 Opportunities of STF -- 3.4 Threats of STF -- 3.5 This Review Paper Will Be Trying to Answer Some of the Research Questions(RQs) -- 4 Conclusion -- 5 Future Work -- References -- Time-Series Based Prediction of Air Quality Index Using Various Machine Learning Models -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Description and Pre-processing -- 3.2 Model Optimization and Training -- 3.3 Performance Evaluation Metrics -- 4 Experimental Result and Discussion -- 5 Conclusion -- References -- The Development of Internet of Things Skills to Enhance Youth Employability in Developing Countries: A Systematic Literature Review -- 1 Introduction -- 2 Background and Motivation for the Study -- 3 Research Method -- 4 Discussion of Findings -- 4.1 Job Opportunities Available for the Youth -- 4.2 Skills for the Youth to Adopt -- 4.3 Recommendations for Developing IoT Skills in Youth -- 5 Conclusion -- References -- Investigating Robotic Process Automation Adoption in South African Banking -- 1 Introduction -- 2 Literature Review -- 2.1 Background -- 2.2 Case Studies of RPA Implementations Specifications -- 3 Research Model -- 3.1 Propositions -- 3.2 Research Approach -- 4 Data Analysis -- 4.1 Data Analysis Technique -- 4.2 Participant Demographics -- 4.3 Thematic Analysis -- 5 Discussion -- 5.1 Technology -- 5.2 Organisation -- 5.3 Environment -- 6 Conclusion -- 6.1 Recommended Further Research -- References -- Calculation of Polarization Conversion Ratio (PCR) of Proposed Polarization Conversion Metamaterials (PCM) is Employed in Reduction of RCS Using AI Techniques for Stealth Technology -- 1 Introduction -- 2 PCM Unit Cell Design -- 3 Artificial Neural Networks -- 4 Data Collection.
4.1 Training Data of PCM -- 4.2 ANN Trained Model -- 5 Validation of Linear Regression Medium Neural Network (LRMNN) -- 6 Result -- 7 Conclusion -- References -- A Mobile Application for Currency Denomination Identification for Visually Impaired -- 1 Introduction -- 2 Related Work -- 3 Proposed Method for Currency Identification -- 3.1 Significant Feature Point Generation -- 3.2 Development of Feature Point Descriptors -- 3.3 Feature Point Matching -- 3.4 Mobile App -- 4 Results and Performance Evaluation -- 5 Conclusions and Future Work -- References -- Deep Belief Network Algorithm-Based Intrusion Detection System in Internet of Things Environments -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Deep Belief Network (DBN) -- 3.2 K Nearest Neighbor -- 3.3 Intrusion Detection System -- 4 Result and Discussion -- 4.1 Environmental Setup -- 4.2 Validation Dataset (Sec) -- 4.3 Accuracy (%) -- 4.4 Mathew Correlation Coefficient (%) -- 5 Conclusion -- References -- Crop Classification Based on Multispectral and Multitemporal Images Using CNN and GRU -- 1 Introduction -- 2 Existing Systems -- 3 Proposed System Design -- 4 Proposed Methodology -- 4.1 Dataset -- 4.2 Data Preprocessing -- 4.3 Data Augmentation -- 4.4 Data Standardization -- 4.5 Train and Test Data Split -- 5 Model Architecture -- 5.1 Flow Diagram -- 5.2 2D CNN Layer -- 5.3 Group Normalization Layer -- 5.4 GRU Layer -- 5.5 Linear Layer -- 6 Results and Comparison -- 6.1 Performance Metrics -- 6.2 Training and Validation Results -- 6.3 Results Comparison -- 7 Conclusion and Future Work -- References -- An IoT-based Arduino System for Client Health Monitoring & -- Interpretation on Account of Basic Essential Markers -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Experimental Results.
4.1 Assessment of Quasi Temperature Mercury Thermometer and Sensor Components (MLX90614) for Bodily Temperature Readings (FI01) -- 4.2 For Those with Respiratory Disease, a Comparison of the MLX90614 Detectors' Measurements of Internal Temperature with a Quasi-Infrared Camera (F101) -- 4.3 A Comparison of the MLX90614 Sensors' Measurements of Core Body Temperature with a Quasi-infrared Camera for Asthmatic Patients (F101). A Subsection Sample -- 5 Conclusions -- References -- A Blockchain Based System for Product Tracing and Tracking in the Supply Chain Management -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Design -- 3.2 System Implementation -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Deadline Laxity and Load Imbalance Analysis for Energy Efficient Greedy, Semi-Greedy and Random Fog Scheduling -- 1 Introduction -- 2 Related Work and Objective -- 3 Simulation Set-Up -- 4 Performance Metrics -- 5 Results and Discussion -- 6 Conclusion -- References -- Survey on the Effectiveness of Traffic Sign Detection and Recognition System -- 1 Introduction -- 2 Traffic Sign and Dataset -- 3 Sign Detection and Recognition -- 4 Performance Evalution of the TSDR -- 5 Challenges in Accurate Tsdr -- 6 Conclusion -- References -- Detection of Ductal Carcinoma Using Restricted Boltzmann Machine and Autoencoder (RBM-AE) in PET Scan -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Restricted Boltzmann Machine (RBM) for Image Extraction -- 3.2 Autoencoder (AE) for Detection -- 4 Materials and Methods -- 4.1 Synthetically Generated PET Scan and Data Normalization -- 4.2 Image Extraction Using RBM -- 4.3 Detection of Malignant and Benign Tumors Using Autoencoder -- 5 Experimentation and Results -- 5.1 Experimentation Setup -- 5.2 Results and Discussion -- 6 Conclusion -- References.
Novel Approach for Network Anomaly Detection Using Autoencoder on CICIDS Dataset -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Computer Model -- 3.2 CICIDS-2017 Dataset -- 3.3 Proposed Workflow -- 4 Performance Evaluation -- 5 Result and Discussion -- 6 Conclusion and Future Scope -- References -- Predictive Analysis of Road Accidents Using Data Mining and Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Defining Problem Statement -- 3.2 Data Collection -- 3.3 Data Cleaning and Preprocessing -- 3.4 Data Analysis (on Various Identified Parameters) -- 3.5 Building Prediction Model -- 3.6 Model Validation, Accuracy Test and Monitoring -- 4 Building Prediction Model -- 4.1 Parameter Identification -- 4.2 Model Training -- 4.3 Prediction Using Linear Regression -- 4.4 Prediction Using Random Forest -- 5 Results and Discussions -- 5.1 Analytical Observations -- 5.2 Prediction Result -- 6 Conclusion -- References -- Digital Shopping Cart with Automatic Billing System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Existing System -- 4 Flowchart -- 5 Method -- 6 Results and Discussions -- 7 Future Scope -- 8 Conclusion -- References -- Analysis of Automated Music Generation Systems Using RNN Generators -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Artificial Intelligence -- 3.2 Deep Learning -- 3.3 Recurrent Neural Networks (RNN's) -- 3.4 Long Short Term (LSTM) -- 3.5 Architecture of LSTM -- 3.6 Description -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Differential Evolution Image Contrast Enhancement Using Clustering -- 1 Introduction -- 2 Differential Evolution Algorithm -- 3 Related Work -- 4 Proposed Method -- 5 Preciseness of Proposed Method -- 6 Experiment and Results -- 6.1 Comparison -- 7 Conclusion -- References.
Smart Traffic Monitoring System.
Record Nr. UNINA-9910770248203321
Hasteer Nitasha  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative pervasive social computing services and application / / guest editors Manju Khari, Gopal Chaudhary and Fadi Al-turjman
Innovative pervasive social computing services and application / / guest editors Manju Khari, Gopal Chaudhary and Fadi Al-turjman
Pubbl/distr/stampa [Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Descrizione fisica 1 online resource (85 pages)
Disciplina 004
Collana International Journal of Pervasive Computing and Communications
Soggetto topico Ubiquitous computing
ISBN 1-80262-942-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks -- RML based ontology development approach in internet of things for healthcare domain -- A novel design layout of three disjoint paths multistage interconnection network & -- its reliability analysis -- A self-congruence and impulse buying effect on user's shopping behaviour over social networking sites: an empirical study -- A new imputation-based incomplete data-driven fuzzy modeling for accuracy improvement in ubiquitous computing applications.
Record Nr. UNINA-9910795350703321
[Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative pervasive social computing services and application / / guest editors Manju Khari, Gopal Chaudhary and Fadi Al-turjman
Innovative pervasive social computing services and application / / guest editors Manju Khari, Gopal Chaudhary and Fadi Al-turjman
Pubbl/distr/stampa [Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Descrizione fisica 1 online resource (85 pages)
Disciplina 004
Collana International Journal of Pervasive Computing and Communications
Soggetto topico Ubiquitous computing
ISBN 1-80262-942-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks -- RML based ontology development approach in internet of things for healthcare domain -- A novel design layout of three disjoint paths multistage interconnection network & -- its reliability analysis -- A self-congruence and impulse buying effect on user's shopping behaviour over social networking sites: an empirical study -- A new imputation-based incomplete data-driven fuzzy modeling for accuracy improvement in ubiquitous computing applications.
Record Nr. UNINA-9910817938903321
[Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of Things and Big Data Analytics for Smart Generation / / edited by Valentina E. Balas, Vijender Kumar Solanki, Raghvendra Kumar, Manju Khari
Internet of Things and Big Data Analytics for Smart Generation / / edited by Valentina E. Balas, Vijender Kumar Solanki, Raghvendra Kumar, Manju Khari
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (309 pages)
Disciplina 006.3
Collana Intelligent Systems Reference Library
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-030-04203-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483559903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Optimization of Automated Software Testing Using Meta-Heuristic Techniques / / edited by Manju Khari, Deepti Bala Mishra, Biswaranjan Acharya, Ruben Gonzalez Crespo
Optimization of Automated Software Testing Using Meta-Heuristic Techniques / / edited by Manju Khari, Deepti Bala Mishra, Biswaranjan Acharya, Ruben Gonzalez Crespo
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (189 pages)
Disciplina 005.14
Collana EAI/Springer Innovations in Communication and Computing
Soggetto topico Computational intelligence
Data mining
Engineering - Data processing
Computational Intelligence
Data Mining and Knowledge Discovery
Data Engineering
ISBN 3-031-07297-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Testing Fundamentals -- Strategies and Methods For Test Cases -- Automated Testing Levels -- Polices and Plans for Testing -- Test Organization -- Controlling and Monitoring Testing Process -- Evaluating Automated Software Quality -- Defect Analysis and Prevention -- Optimization -- Security Testing -- Conclusion.
Record Nr. UNINA-9910616360803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless communication security : mobile and network security protocols / / edited by Manju Khari, Manisha Bharti, M. Niranjanamurthy
Wireless communication security : mobile and network security protocols / / edited by Manju Khari, Manisha Bharti, M. Niranjanamurthy
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023]
Descrizione fisica 1 online resource (290 pages)
Disciplina 002
Soggetto topico Wireless communication systems - Security measures
ISBN 1-119-77746-1
1-119-77745-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 M2M in 5G Cellular Networks: Challenges, Proposed Solutions, and Future Directions -- 1.1 Introduction -- 1.2 Literature Survey -- 1.3 Survey Challenges and Proposed Solutions of M2M -- 1.3.1 PARCH Overload Problem -- 1.3.2 Inefficient Radio Resource Utilization and Allocation -- 1.3.3 M2M Random Access Challenges -- 1.3.4 Clustering Techniques -- 1.3.5 QoS Provisioning for M2M Communications -- 1.3.6 Less Cost and Low Power Device Requirements -- 1.3.7 Security and Privacy -- 1.4 Conclusion -- References -- Chapter 2 MAC Layer Protocol for Wireless Security -- 2.1 Introduction -- 2.2 MAC Layer -- 2.2.1 Centralized Control -- 2.2.2 Deterministic Access -- 2.2.3 Non-Deterministic Access -- 2.3 Functions of the MAC Layer -- 2.4 MAC Layer Protocol -- 2.4.1 Random Access Protocol -- 2.4.2 Controlled Access Protocols -- 2.4.3 Channelization -- 2.5 MAC Address -- 2.6 Conclusion and Future Scope -- References -- Chapter 3 Enhanced Image Security Through Hybrid Approach: Protect Your Copyright Over Digital Images -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Design Issues -- 3.3.1 Robustness Against Various Attack Conditions -- 3.3.2 Distortion and Visual Quality -- 3.3.3 Working Domain -- 3.3.4 Human Visual System (HVS) -- 3.3.5 The Trade-Off between Robustness and Imperceptibility -- 3.3.6 Computational Cost -- 3.4 A Secure Grayscale Image Watermarking Based on DWT-SVD -- 3.5 Experimental Results -- 3.6 Conclusion -- References -- Chapter 4 Quantum Computing -- 4.1 Introduction -- 4.2 A Brief History of Quantum Computing -- 4.3 Postulate of Quantum Mechanics -- 4.4 Polarization and Entanglement -- 4.5 Applications and Advancements -- 4.5.1 Cryptography, Teleportation and Communication Networks -- 4.5.2 Quantum Computing and Memories.
4.5.3 Satellite Communication Based on Quantum Computing -- 4.5.4 Machine Learning & -- Artificial Intelligence -- 4.6 Optical Quantum Computing -- 4.7 Experimental Realisation of Quantum Computer -- 4.7.1 Hetero-Polymers -- 4.7.2 Ion Traps -- 4.7.3 Quantum Electrodynamics Cavity -- 4.7.4 Quantum Dots -- 4.8 Challenges of Quantum Computing -- 4.9 Conclusion and Future Scope -- References -- Chapter 5 Feature Engineering for Flow-Based IDS -- 5.1 Introduction -- 5.1.1 Intrusion Detection System -- 5.1.2 IDS Classification -- 5.2 IP Flows -- 5.2.1 The Architecture of Flow-Based IDS -- 5.2.2 Wireless IDS Designed Using Flow-Based Approach -- 5.2.3 Comparison of Flow- and Packet-Based IDS -- 5.3 Feature Engineering -- 5.3.1 Curse of Dimensionality -- 5.3.2 Feature Selection -- 5.3.3 Feature Categorization -- 5.4 Classification of Feature Selection Technique -- 5.4.1 The Wrapper, Filter, and Embedded Feature Selection -- 5.4.2 Correlation, Consistency, and PCA-Based Feature Selection -- 5.4.3 Similarity, Information Theoretical, Sparse Learning, and Statistical-Based Feature Selection -- 5.4.4 Univariate and Multivariate Feature Selection -- 5.5 Tools and Library for Feature Selection -- 5.6 Literature Review on Feature Selection in Flow-Based IDS -- 5.7 Challenges and Future Scope -- 5.8 Conclusions -- Acknowledgement -- References -- Chapter 6 Environmental Aware Thermal (EAT) Routing Protocol for Wireless Sensor Networks -- 6.1 Introduction -- 6.1.1 Single Path Routing Protocol -- 6.1.2 Multipath Routing Protocol -- 6.1.3 Environmental Influence on WSN -- 6.2 Motivation Behind the Work -- 6.3 Novelty of This Work -- 6.4 Related Works -- 6.5 Proposed Environmental Aware Thermal (EAT) Routing Protocol -- 6.5.1 Sensor Node Environmental Modeling and Analysis -- 6.5.2 Single Node Environmental Influence Modeling -- 6.5.3 Multiple Node Modeling.
6.5.4 Sensor Node Surrounding Temperature Field -- 6.5.5 Sensor Node Remaining Energy Calculation -- 6.5.6 Delay Modeling -- 6.6 Simulation Parameters -- 6.7 Results and Discussion -- 6.7.1 Temperature Influence on Network -- 6.7.2 Power Consumption -- 6.7.3 Lifetime Analysis -- 6.7.4 Delay Analysis -- 6.8 Conclusion -- References -- Chapter 7 A Comprehensive Study of Intrusion Detection and Prevention Systems -- 7.1 Introduction -- 7.1.1 Intrusion and Detection -- 7.1.2 Some Basic Definitions -- 7.1.3 Intrusion Detection and Prevention System -- 7.1.4 Need for IDPS: More Than Ever -- 7.1.5 Introduction to Alarms -- 7.1.6 Components of an IDPS -- 7.2 Configuring IDPS -- 7.2.1 Network Architecture of IDPS -- 7.2.2 A Glance at Common Types -- 7.2.2.1 Network-Based IDS -- 7.2.2.2 Host-Based IDS -- 7.2.3 Intrusion Detection Techniques -- 7.2.3.1 Conventional Techniques -- 7.2.3.2 Machine Learning-Based and Hybrid Techniques -- 7.2.4 Three Considerations -- 7.2.4.1 Location of Sensors -- 7.2.4.2 Security Capabilities -- 7.2.4.3 Management Capabilities -- 7.2.5 Administrators' Functions -- 7.2.5.1 Deployment -- 7.2.5.2 Testing -- 7.2.5.3 Security Consideration of IDPS -- 7.2.5.4 Regular Backups and Monitoring -- 7.2.6 Types of Events Detected -- 7.2.7 Role of State in Network Security -- 7.3 Literature Review -- 7.4 Conclusion -- References -- Chapter 8 Hardware Devices Integration With IoT -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Component Description -- 8.3.1 Arduino Board UNO -- 8.3.2 Raspberry Pi -- 8.4 Case Studies -- 8.4.1 Ultrasonic Sensor -- 8.4.2 Temperature and Humidity Sensor -- 8.4.3 Weather Monitoring System Using Raspberry Pi -- 8.5 Drawbacks of Arduino and Raspberry Pi -- 8.6 Challenges in IoT -- 8.6.1 Design Challenges -- 8.6.2 Security Challenges -- 8.6.3 Development Challenges -- 8.7 Conclusion -- 8.8 Annexures -- References.
Additional Resources -- Chapter 9 Depth Analysis On DoS & -- DDoS Attacks -- 9.1 Introduction -- 9.1.1 Objective and Motivation -- 9.1.2 Symptoms and Manifestations -- 9.2 Literature Survey -- 9.3 Timeline of DoS and DDoS Attacks -- 9.4 Evolution of Denial of Service (DoS) & -- Distributed Denial of Service (DDoS) -- 9.5 DDoS Attacks: A Taxonomic Classification -- 9.5.1 Classification Based on Degree of Automation -- 9.5.2 Classification Based on Exploited Vulnerability -- 9.5.3 Classification Based on Rate Dynamics of Attacks -- 9.5.4 Classification Based on Impact -- 9.6 Transmission Control Protocol -- 9.6.1 TCP Three-Way Handshake -- 9.7 User Datagram Protocol -- 9.7.1 UDP Header -- 9.8 Types of DDoS Attacks -- 9.8.1 TCP SYN Flooding Attack -- 9.8.2 UDP Flooding Attack -- 9.8.3 Smurf Attack -- 9.8.4 Ping of Death Attack -- 9.8.5 HTTP Flooding Attack -- 9.9 Impact of DoS/DDoS on Various Areas -- 9.9.1 DoS/DDoS Attacks on VoIP Networks Using SIP -- 9.9.2 DoS/DDoS Attacks on VANET -- 9.9.3 DoS/DDoS Attacks on Smart Grid System -- 9.9.4 DoS/DDoS Attacks in IoT-Based Devices -- 9.10 Countermeasures to DDoS Attack -- 9.10.1 Prevent Being Agent/Secondary Target -- 9.10.2 Detect and Neutralize Attacker -- 9.10.3 Potential Threats Detection/Prevention -- 9.10.4 DDoS Attacks and How to Avoid Them -- 9.10.5 Deflect Attack -- 9.10.6 Post-Attack Forensics -- 9.11 Conclusion -- 9.12 Future Scope -- References -- Chapter 10 SQL Injection Attack on Database System -- 10.1 Introduction -- 10.1.1 Types of Vulnerabilities -- 10.1.2 Types of SQL Injection Attack -- 10.1.3 Impact of SQL Injection Attack -- 10.2 Objective and Motivation -- 10.3 Process of SQL Injection Attack -- 10.4 Related Work -- 10.5 Literature Review -- 10.6 Implementation of the SQL Injection Attack -- 10.6.1 Access the Database Using the 1=1 SQL Injection Statement.
10.6.2 Access the Database Using the ""='''' SQL Injection Statement -- 10.6.3 Access and Upgrade the Database by Using Batch SQL Injection Statement -- 10.7 Detection of SQL Injection Attack -- 10.8 Prevention/Mitigation from SQL Injection Attack -- 10.9 Conclusion -- References -- Chapter 11 Machine Learning Techniques for Face Authentication System for Security Purposes -- 11.1 Introduction -- 11.2 Face Recognition System (FRS) in Security -- 11.3 Theory -- 11.3.1 Neural Networks -- 11.3.2 Convolutional Neural Network (CNN) -- 11.3.3 K-Nearest Neighbors (KNN) -- 11.3.4 Support Vector Machine (SVM) -- 11.3.5 Logistic Regression (LR) -- 11.3.6 Naive Bayes (NB) -- 11.3.7 Decision Tree (DT) -- 11.4 Experimental Methodology -- 11.4.1 Dataset -- 11.4.2 Convolutional Neural Network (CNN) -- 11.4.3 Other Machine Learning Techniques -- 11.5 Results -- 11.6 Conclusion -- References -- Chapter 12 Estimation of Computation Time for Software-Defined Networking-Based Data Traffic Offloading System in Heterogeneous Network -- 12.1 Introduction -- 12.1.1 Motivation -- 12.1.2 Objective -- 12.1.3 The Main Contributions of This Chapter -- 12.2 Analysis of SDN-TOS Mechanism -- 12.2.1 Key Components of SDN-TOS -- 12.2.2 LTE/Wi-Fi in a Heterogeneous Network (HetNet) -- 12.2.3 Centralized SDN Controller -- 12.2.4 Key Design Considerations of SDN-TOS -- 12.2.4.1 The System Architecture -- 12.2.4.2 Mininet Wi-Fi Emulated Networks -- 12.2.4.3 Software-Defined Networking Controller -- 12.3 Materials and Methods -- 12.3.1 Estimating Time Consumption for Mininet Wi-Fi Emulator -- 12.3.1.1 Total Time Consumption for Offloading the Data Traffic by Service Provider -- 12.3.1.2 Total Time Consumption of Mininet Wi-Fi Emulator (Time Consumption for Both LTE and Wi-Fi Network) -- 12.3.2 Estimating Time Consumption for SDN Controller.
12.3.2.1 Total Response Time for Sub-Controller.
Record Nr. UNINA-9910676533903321
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui