top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Analytics, Machine Learning, and Artificial Intelligence : Second Analytics Global Conference, AGC 2024, Kolkata, India, March 6–7, 2024, Revised Selected Papers / / edited by Suparna Dhar, Sanjay Goswami, Dinesh Kumar Unni Krishnan, Indranil Bose, Rameshwar Dubey, Chandan Mazumdar
Analytics, Machine Learning, and Artificial Intelligence : Second Analytics Global Conference, AGC 2024, Kolkata, India, March 6–7, 2024, Revised Selected Papers / / edited by Suparna Dhar, Sanjay Goswami, Dinesh Kumar Unni Krishnan, Indranil Bose, Rameshwar Dubey, Chandan Mazumdar
Autore Dhar Suparna
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (275 pages)
Disciplina 006.3
Altri autori (Persone) GoswamiSanjay
Unni KrishnanDinesh Kumar
BoseIndranil
DubeyRameshwar
MazumdarChandan
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Data structures (Computer science)
Information theory
Machine learning
Artificial Intelligence
Data Structures and Information Theory
Machine Learning
ISBN 9783031751578
3031751574
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Applications of Analytics in Business. -- Next-Gen Cold Storage Surveillance Platform. -- Attack Hypergraph: A Framework for Modeling Multi-Stage Attacks. -- Ensuring Integrity in Blockchain-Based Health Information Exchange through Collaborative Data Safeguards. -- Predictive Modelling of Airline Baggage Complaints Using Facebook Prophet: A Time Series Analysis. -- Path Planning in Disaster Management Scenarios. -- Analytics Methods, Tools & Techniques. -- Machine Learning-Driven Feature Selection for Performance Analysis in Student Mental Health. -- Utilizing Social Media for Understanding Public Opinion on Transportation in Indian Cities. -- Classification of Various Iris Patterns of Amphibians using Geometric and Color Features. -- Recognition of the Hornbill Eye’s Iris using Bit Plane Processing, Un-Sharp Masking and High Boost Filtering. -- Analyzing Post-Shopping Facial Expressions Unraveling Emotions for Enhanced Consumer Insights. -- AI Based Energy Resources Management for PV/Wind/Diesel/Battery Hybrid System. -- Unraveling the Complexity of Anti-Vax Concerns during the COVID-19 Pandemic. -- Recommending influential authors using content-based filtering and network similarity-a case study on disease-related research. -- An Examination of the Effectiveness of SMOTE-based Algorithms on Software Defect Prediction. -- Development of An Essential Education Performance Prediction Tool Using Machine Learning. -- Groundwater Quality Assessment of Indian Pumping Stations using Unsupervised Machine Learning and Cluster Analysis. -- Predicting Performance of Players in the Knockouts of Cricket World Cup Based on Their Performance in League Matches Using Machine Learning. -- Lung-UNet: A modified UNet-based DNN for COVID Lung Segmentation from Chest X-Ray and CT-Scan Images.
Record Nr. UNINA-9910983061303321
Dhar Suparna  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings / / edited by Sushil Jajoda, Chandan Mazumdar
Information Systems Security [[electronic resource] ] : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings / / edited by Sushil Jajoda, Chandan Mazumdar
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVI, 584 p. 156 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Systems and Data Security
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-319-26961-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access control -- Attacks and mitigation -- Cloud security -- Crypto systems and protocols -- Information flow control -- Sensor networks and cognitive radio -- Watermarking and steganography.
Record Nr. UNISA-996466231203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings / / edited by Sushil Jajoda, Chandan Mazumdar
Information Systems Security : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings / / edited by Sushil Jajoda, Chandan Mazumdar
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVI, 584 p. 156 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer networks
Algorithms
Management information systems
Computer science
Systems and Data Security
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-319-26961-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access control -- Attacks and mitigation -- Cloud security -- Crypto systems and protocols -- Information flow control -- Sensor networks and cognitive radio -- Watermarking and steganography.
Record Nr. UNINA-9910483505703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XV, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Computer security
Application software
Information storage and retrieval
Management information systems
Computer science
Data encryption (Computer science)
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Management of Computing and Information Systems
Cryptology
ISBN 3-642-25560-4
Classificazione 004
DAT 461f
DAT 959f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465923403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Information Systems Security [[electronic resource] ] : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 342 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Information storage and retrieval
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution.
Record Nr. UNISA-996465721503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Information Systems Security : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 342 p.)
Disciplina 005.8
Altri autori (Persone) JajodiaSushil
MazumdarChandan
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Computers and civilization
Electronic data processing - Management
Information storage and retrieval systems
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
IT Operations
Information Storage and Retrieval
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled EnterpriseSecurity Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution.
Record Nr. UNINA-9910484587203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui