Analytics, Machine Learning, and Artificial Intelligence : Second Analytics Global Conference, AGC 2024, Kolkata, India, March 6–7, 2024, Revised Selected Papers / / edited by Suparna Dhar, Sanjay Goswami, Dinesh Kumar Unni Krishnan, Indranil Bose, Rameshwar Dubey, Chandan Mazumdar
| Analytics, Machine Learning, and Artificial Intelligence : Second Analytics Global Conference, AGC 2024, Kolkata, India, March 6–7, 2024, Revised Selected Papers / / edited by Suparna Dhar, Sanjay Goswami, Dinesh Kumar Unni Krishnan, Indranil Bose, Rameshwar Dubey, Chandan Mazumdar |
| Autore | Dhar Suparna |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (275 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
GoswamiSanjay
Unni KrishnanDinesh Kumar BoseIndranil DubeyRameshwar MazumdarChandan |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Artificial intelligence
Data structures (Computer science) Information theory Machine learning Artificial Intelligence Data Structures and Information Theory Machine Learning |
| ISBN |
9783031751578
3031751574 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Applications of Analytics in Business. -- Next-Gen Cold Storage Surveillance Platform. -- Attack Hypergraph: A Framework for Modeling Multi-Stage Attacks. -- Ensuring Integrity in Blockchain-Based Health Information Exchange through Collaborative Data Safeguards. -- Predictive Modelling of Airline Baggage Complaints Using Facebook Prophet: A Time Series Analysis. -- Path Planning in Disaster Management Scenarios. -- Analytics Methods, Tools & Techniques. -- Machine Learning-Driven Feature Selection for Performance Analysis in Student Mental Health. -- Utilizing Social Media for Understanding Public Opinion on Transportation in Indian Cities. -- Classification of Various Iris Patterns of Amphibians using Geometric and Color Features. -- Recognition of the Hornbill Eye’s Iris using Bit Plane Processing, Un-Sharp Masking and High Boost Filtering. -- Analyzing Post-Shopping Facial Expressions Unraveling Emotions for Enhanced Consumer Insights. -- AI Based Energy Resources Management for PV/Wind/Diesel/Battery Hybrid System. -- Unraveling the Complexity of Anti-Vax Concerns during the COVID-19 Pandemic. -- Recommending influential authors using content-based filtering and network similarity-a case study on disease-related research. -- An Examination of the Effectiveness of SMOTE-based Algorithms on Software Defect Prediction. -- Development of An Essential Education Performance Prediction Tool Using Machine Learning. -- Groundwater Quality Assessment of Indian Pumping Stations using Unsupervised Machine Learning and Cluster Analysis. -- Predicting Performance of Players in the Knockouts of Cricket World Cup Based on Their Performance in League Matches Using Machine Learning. -- Lung-UNet: A modified UNet-based DNN for COVID Lung Segmentation from Chest X-Ray and CT-Scan Images. |
| Record Nr. | UNINA-9910983061303321 |
Dhar Suparna
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Systems Security [[electronic resource] ] : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings / / edited by Sushil Jajoda, Chandan Mazumdar
| Information Systems Security [[electronic resource] ] : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings / / edited by Sushil Jajoda, Chandan Mazumdar |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (XVI, 584 p. 156 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Algorithms Management information systems Computer science Systems and Data Security Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems |
| ISBN | 3-319-26961-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Access control -- Attacks and mitigation -- Cloud security -- Crypto systems and protocols -- Information flow control -- Sensor networks and cognitive radio -- Watermarking and steganography. |
| Record Nr. | UNISA-996466231203316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Systems Security : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings / / edited by Sushil Jajoda, Chandan Mazumdar
| Information Systems Security : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings / / edited by Sushil Jajoda, Chandan Mazumdar |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (XVI, 584 p. 156 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Computer networks Algorithms Management information systems Computer science Systems and Data Security Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems |
| ISBN | 3-319-26961-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Access control -- Attacks and mitigation -- Cloud security -- Crypto systems and protocols -- Information flow control -- Sensor networks and cognitive radio -- Watermarking and steganography. |
| Record Nr. | UNINA-9910483505703321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
| Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar |
| Edizione | [1st ed. 2011.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
| Descrizione fisica | 1 online resource (XV, 388 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer communication systems
Computer security Application software Information storage and retrieval Management information systems Computer science Data encryption (Computer science) Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Information Storage and Retrieval Management of Computing and Information Systems Cryptology |
| ISBN | 3-642-25560-4 |
| Classificazione |
004
DAT 461f DAT 959f SS 4800 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996465923403316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Systems Security [[electronic resource] ] : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
| Information Systems Security [[electronic resource] ] : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
| Descrizione fisica | 1 online resource (XII, 342 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Computers and civilization Management information systems Computer science Information storage and retrieval Cryptology Computer Communication Networks Operating Systems Computers and Society Management of Computing and Information Systems Information Storage and Retrieval |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution. |
| Record Nr. | UNISA-996465721503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Systems Security : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
| Information Systems Security : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
| Descrizione fisica | 1 online resource (XII, 342 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
JajodiaSushil
MazumdarChandan |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Operating systems (Computers) Computers and civilization Electronic data processing - Management Information storage and retrieval systems Cryptology Computer Communication Networks Operating Systems Computers and Society IT Operations Information Storage and Retrieval |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled EnterpriseSecurity Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution. |
| Record Nr. | UNINA-9910484587203321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||