top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Big Data Analytics and Computational Intelligence for Cybersecurity [[electronic resource] /] / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar
Big Data Analytics and Computational Intelligence for Cybersecurity [[electronic resource] /] / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (336 pages)
Disciplina 005.7
Collana Studies in Big Data
Soggetto topico Engineering - Data processing
Computational intelligence
Big data
Artificial intelligence
Cooperating objects (Computer systems)
Data Engineering
Computational Intelligence
Big Data
Artificial Intelligence
Cyber-Physical Systems
ISBN 3-031-05752-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto New Advancements in Cybersecurity: A Comprehensive Survey -- CPSs Communication using 5G Network in the Light of Security -- A Survey on Security Aspects in RPL Protocol over IoT Network -- Analysis of Cybersecurity Risks and their Mitigation for Work-from-Home Tools and Techniques -- A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IoT Layers -- Software-Defined Networking Security: A Comprehensive Review.
Record Nr. UNISA-996490366603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Big Data Analytics and Computational Intelligence for Cybersecurity / / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar
Big Data Analytics and Computational Intelligence for Cybersecurity / / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (336 pages)
Disciplina 005.7
005.8
Collana Studies in Big Data
Soggetto topico Engineering - Data processing
Computational intelligence
Big data
Artificial intelligence
Cooperating objects (Computer systems)
Data Engineering
Computational Intelligence
Big Data
Artificial Intelligence
Cyber-Physical Systems
Dades massives
Seguretat informàtica
Intel·ligència computacional
Objectes cooperants (Sistemes informàtics)
Soggetto genere / forma Llibres electrònics
ISBN 3-031-05752-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto New Advancements in Cybersecurity: A Comprehensive Survey -- CPSs Communication using 5G Network in the Light of Security -- A Survey on Security Aspects in RPL Protocol over IoT Network -- Analysis of Cybersecurity Risks and their Mitigation for Work-from-Home Tools and Techniques -- A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IoT Layers -- Software-Defined Networking Security: A Comprehensive Review.
Record Nr. UNINA-9910591042103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational intelligence for unmanned aerial vehicles communication networks / / Mariya Ouaissa [and four others], editors
Computational intelligence for unmanned aerial vehicles communication networks / / Mariya Ouaissa [and four others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (294 pages)
Disciplina 629.1326
Collana Studies in Computational Intelligence
Soggetto topico Drone aircraft - Control systems
Drone aircraft - Design and construction
ISBN 3-030-97113-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Machine Learning and AI Approach to Improve UAV Communication and Networking -- 1 Introduction -- 2 Literature Discussions -- 3 UAVs Characteristics -- 4 Artificial Intelligence and Machine Learning -- 4.1 Machine Learning Approaches -- 5 Unsupervised and Supervised ML for UAVs -- 5.1 Supervised-Based Learning -- 5.2 Unsupervised Learning Overview -- 6 Solution for UAVs-Based Issues -- 6.1 UAVs Coordination and Placement -- 6.2 Path Calculation -- 6.3 Virtual Reality in Drones -- 6.4 Abnormalities in Drone Monitoring -- 6.5 UAVs Detection -- 7 Interpretation and Future Practice -- 8 Conclusion -- References -- Implementation of Machine Learning Techniques in Unmanned Aerial Vehicle Control and Its Various Applications -- 1 Introduction -- 2 Classification of UAV -- 3 Unmanned Aerial Vehicle (UAV) Market Trends and Values -- 4 Machine Learning Techniques for UAV Applications -- 4.1 Linear Regression -- 4.2 Logistic Regression -- 4.3 Decision Tree (DT) -- 4.4 Random Forest (RF) -- 4.5 Support Vector Machine (SVM) -- 5 Applications of Machine Learning Techniques in UAV -- 6 Summary and Discussion -- 7 Conclusion -- References -- Machine Learning Techniques for UAV Trajectory Optimization-A Survey -- 1 Introduction -- 1.1 What is UAV? -- 1.2 Machine Learning with Artificial Intelligence -- 2 Survey Works -- 2.1 Issues on Physical Layer -- 2.2 Channel-Modeling -- 2.3 Interference Management -- 2.4 Configuration of Transmission Parameters -- 3 Resource Management and Network Planning -- 4 Open Issues -- 4.1 Implementation -- 4.2 Issues in Physical Layer -- 4.3 Issues in Security and Privacy -- 5 Conclusion -- References -- Metaheuristic Algorithms for Integrated Navigation Systems -- 1 Introduction -- 2 Expressing the Navigation Problem -- 2.1 Inertial Navigation -- 2.2 Integrated Navigation.
3 Optimization by Using Metaheuristic Algorithms -- 3.1 Genetic Algorithm -- 3.2 Particle Swarm Optimization -- 3.3 Inclined Planes System Optimization -- 3.4 Modified Inclined Planes System Optimization -- 4 Metaheuristic Algorithms for Designing Integrated Navigation Systems -- 5 Results -- 6 Conclusions -- References -- Security Threats in Flying Ad Hoc Network (FANET) -- 1 Introduction -- 2 Overview of FANET -- 2.1 Network Topology -- 2.2 Mobility Models -- 2.3 Node Mobility -- 2.4 Node Density -- 2.5 Localization -- 2.6 Power Consumption -- 2.7 Radio Propagation Model -- 3 Literature Review -- 4 Security in FANET -- 5 Security Challenges -- 5.1 Dynamic Network Topology -- 5.2 High Mobility -- 5.3 Error Tolerance -- 5.4 Latency Control -- 5.5 Key Distribution -- 5.6 Data Consistency -- 5.7 Location Awareness -- 5.8 Need of High Computational Ability -- 5.9 Privacy -- 5.10 Routing Protocol -- 5.11 Network Scalability -- 6 Security Services -- 6.1 Availability -- 6.2 Confidentiality -- 6.3 Data Integrity -- 6.4 Authentication -- 6.5 Non-repudiation -- 7 Types of Attackers -- 7.1 Basis of Membership -- 7.2 Basis of Intention -- 7.3 Basis of Activity -- 7.4 Basis of Scope -- 8 Security Threats -- 8.1 Attack on Availability -- 8.2 Attack on Confidentiality -- 8.3 Attack on Data Integrity -- 8.4 Attack on Authentication -- 8.5 Attack on Non-repudiation -- 9 Solution for Security Threats -- 9.1 SEAD -- 9.2 Ariadne -- 9.3 RobSAD -- 9.4 ARAN -- 9.5 SAODV -- 9.6 A-SAODV -- 9.7 One Time Cookie -- 10 Conclusion -- References -- Secure Communication Routing in FANETs: A Survey -- 1 Introduction -- 2 Literature Review -- 3 Wireless Communication -- 3.1 Mobility Models -- 3.2 Time-Dependent Mobility Models -- 3.3 Routing Protocols in FANETs -- 4 Conclusion -- References -- Impact of Routing Techniques and Mobility Models on Flying Ad Hoc Networks.
1 Introduction -- 1.1 Types of Networks -- 1.2 Traditional Network -- 2 Background Study -- 2.1 Mobile Ad Hoc Network (MANET) -- 2.2 Vehicular Ad Hoc Network (VANET) -- 2.3 Flying Ad Hoc Network (FANET) -- 2.4 Single, Multiple and Multiple-group UAVs Application Network -- 2.5 Classification of UAVs -- 2.6 Mobility Models -- 2.7 Routing Techniques -- 3 Conclusion and Future Direction -- References -- Analysis of Vulnerabilities in Cybersecurity in Unmanned Air Vehicles -- 1 Introduction -- 2 Motivation -- 3 Cybersecurity Threats -- 3.1 Spoofing -- 3.2 Tampering -- 3.3 Repudiation -- 3.4 Information Disclosure -- 3.5 Dos -- 3.6 Elevation of Privilege -- 4 Attacks -- 4.1 Spoofing Attack -- 4.2 Man in the Middle Attack -- 4.3 DoS Attack -- 4.4 Buffer Overflow Attack -- 4.5 Eaves Dropping Attack -- 5 Conclusion -- References -- Silent Listening to Detect False Data Injection Attack and Recognize the Attacker in Smart Car Platooning -- 1 Introduction -- 2 Related Works -- 2.1 Summary of Contributions -- 2.2 Chapter Organization -- 3 Research Method -- 3.1 FDI Attack Detection -- 3.2 FDI Attacker Recognition -- 3.3 Smart-Car Based Test Bed Creation for Sample Collection -- 3.4 Procedure -- 3.5 Instruments -- 3.6 Data Analysis Technique -- 4 Results and Discussion -- 4.1 Examining Correctness of Algorithms1 and 2 -- 4.2 Brief Answers for RQs -- 5 Conclusion -- References -- Taxonomy of UAVs GPS Spoofing and Jamming Attack Detection Methods -- 1 Introduction -- 1.1 Motivation Based on the Statical Reports -- 1.2 Classification of UAVs -- 1.3 Design Considerations of UAV -- 2 Taxonomy of UAV Routing Protocols -- 2.1 Topology Based Routing -- 2.2 Position-Based Routing -- 2.3 Hierarchical Routing -- 2.4 Probabilistic Routing Protocols -- 2.5 AI-Enabled Routing Protocols -- 2.6 Deterministic Routing Protocol -- 2.7 Stochastic Routing Protocols.
2.8 Social Network-Based Approach -- 3 Vulnerabilities in UAV -- 3.1 System-Related Vulnerabilities -- 3.2 Propagation Channel Vulnerabilities -- 3.3 Interference's Vulnerabilities -- 4 GPS Spoofing and Jamming Attacks -- 4.1 GPS Spoofing Attack -- 4.2 Jamming Attack -- 5 Literature Survey -- 6 Conclusion -- References -- Investigation on Challenges of Big Data Analytics in UAV Surveillance -- 1 Introduction -- 1.1 UAV Surveillance -- 1.2 Application of UAV Surveillance -- 1.3 Importance of UAV Surveillance -- 2 Big Data Analytics -- 2.1 Importance of Big Data Analytics -- 2.2 Significance of Big Data Analytics in UAV Surveillance -- 3 Background Study -- 4 Challenges of Big Data Analytics in UAV Surveillance -- 4.1 Safety -- 4.2 Privacy -- 4.3 Security -- 5 Conclusion -- References -- UAV-Based Photogrammetry and Seismic Zonation Approach for Earthquakes Hazard Analysis of Pakistan -- 1 Introduction -- 2 UAVs Impacts in Hazard Analysis and Rescue-Based Mission -- 3 Seismicity of the Area -- 4 Regional Tectonic Setup -- 4.1 Main Karakoram Thrust -- 4.2 Main Mantle Thrust -- 4.3 Main Boundary Thrust -- 5 Neighbor Embedding for Seismic Zonation -- 5.1 Manifold Learning -- 5.2 Seismicity of Pakistan -- 6 Bilinear Interpolation for Seismic Zonation -- 6.1 Directional Bilinear Interpolation Approach -- 6.2 Results and Interpration from Pakistan Bilinear-Based Interpolation -- 7 Conclusion -- References -- Optimizing UAV Path for Disaster Management in Smart Cities Using Metaheuristic Algorithms -- 1 Introduction -- 2 Related Study -- 2.1 Abbreviations -- 3 Mathematical Modeling and Metaheuristic Algorithm -- 3.1 Problem Statement -- 3.2 Path Optimization Using SFOA -- 4 Case Studies with Discussion -- 4.1 Scenario 1: General Environment -- 4.2 Scenario 2: Condense Obstacle Environment -- 4.3 Scenario 3: Maze Environment.
4.4 Scenario 4: Dynamic Environment -- 4.5 Performance Evaluation -- 5 Conclusion -- References -- UAV-Based Rescue System and Seismic Zonation for Hazard Analysis and Disaster Management -- 1 Introduction -- 2 Tectonic Setting of Kalabagh Area -- 2.1 Salt Range and Trans Indus Range Thrust -- 2.2 Surghar Fault -- 3 Approaches for Seismic Zonation of Kalabagh -- 3.1 Kriging Methodology -- 3.2 Cubic Convolution -- 4 Conclusion -- References -- Multi-sensor Fusion Methods for Unmanned Aerial Vehicles to Detect Environment Using Deep Learning Techniques -- 1 Introduction -- 1.1 Deep Learning in Object Detection -- 2 Multiple Sensors Fusion with CNN -- 2.1 ADAS (Advanced Driver Assistance System) -- 3 Multi-sensor Fusion Algorithm -- 3.1 Sensor Fusion Using FusionNet -- 3.2 Sensor Information Fusion Technology -- 3.3 CNN and Regression -- 4 Conclusion -- References -- General Parametric of Two Micro-Concentrator Photovoltaic Systems for Drone Application -- 1 Introduction -- 2 File Basic Concepts for Solar 4 Concentrators -- 3 Simulation Results -- 4 Conclusion -- References.
Record Nr. UNINA-9910558490603321
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence in Internet of Agricultural Things / / edited by M. G. Sumithra, Malathy Sathyamoorthy, M. Manikandan, Rajesh Kumar Dhanaraj, Mariya Ouaissa
Computational Intelligence in Internet of Agricultural Things / / edited by M. G. Sumithra, Malathy Sathyamoorthy, M. Manikandan, Rajesh Kumar Dhanaraj, Mariya Ouaissa
Autore Sumithra M. G
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (464 pages)
Disciplina 006.3
Altri autori (Persone) SathyamoorthyMalathy
ManikandanM
DhanarajRajesh Kumar
OuaissaMariya
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Artificial intelligence
Agriculture
Computational Intelligence
Artificial Intelligence
ISBN 3-031-67450-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- 1: Computational Intelligence and Internet of Things in the Agriculture Sector: An Introduction. -- 2: Role of Big Data Analytics in Intelligent Agriculture. -- 3: Machine learning-based remote monitoring and predictive analytics system for apple harvest storage: A statistical model based approach. -- 4: Revolutionizing Agriculture: Integrating IoT Cloud, And Machine Learning for Smart Farm Monitoring and Precision Agriculture. -- 5: Impact of Advanced Sensing Technologies in Agriculture with Soil, Crop, Climate and Farmland-based approaches using Internet of Things. -- 6: An analytical approach and concept mapping of agricultural issues using deep learning techniques. -- 7: Explainable AI for next generation Agriculture - Current Scenario and Future Prospects. -- 8: Barriers to implementing computational intelligence-based agriculture system. -- 9: Agri-Chain: A Blockchain-Empowered Smart Solution for Agricultural Industry. -- 10: Exploiting Internet of Things and AI-Enabled for Real-Time Decision Support in Precision Farming Practices. -- 11: Advancing Plant Disease Detection with Hybrid Models: Vision Transformer and CNN-Based Approaches. -- 12: Optimizing Agricultural Risk Management with Hybrid Block-chain and Fog Computing Architectures for Secure and Efficient Data Handling. -- 13: Innovating with Quantum Computing Approaches in Block-chain for Enhanced Security and Data Privacy in Agricultural IoT Systems. -- 14: Implementing Fog Computing in Precision Agriculture for Real-time Soil Health Monitoring and Data Management. -- 15: Empowering Farmers: An AI-Based Solution for Agricultural Challenges. -- 16: Artificial Intelligence in Agriculture: Potential Applications and Future Aspects. -- 17: Case study on Smart irrigation using Internet of Things and XAI Techniques.
Record Nr. UNINA-9910882897703321
Sumithra M. G  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence in Recent Communication Networks / / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Bassma Guermah
Computational Intelligence in Recent Communication Networks / / edited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Bassma Guermah
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (279 pages)
Disciplina 006.3
004.6
Collana EAI/Springer Innovations in Communication and Computing
Soggetto topico Computational intelligence
Telecommunication
Artificial intelligence
Computational Intelligence
Communications Engineering, Networks
Artificial Intelligence
ISBN 3-030-77185-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. An Overview of Blockchain and 5G Networks -- Chapter 2. Deep Learning Approach for Interference Mitigation in FBMC/OQAM-MIMO Systems -- Chapter 3. Deep Learning in Non-Orthogonal Multiple Access for 5G and beyond Networks -- Chapter 4. Traffic Sign Detection: A Comparative Study between CNN and RNN -- Chapter 5. Merging Attack-Defense Tree and Game Theory to Analyze Vehicular Ad-Hoc Network Security -- Chapter 6. A Secure Vehicle to Everything (V2X) Communication Model for Intelligent Transportation System -- Chapter 7. A Novel Unsupervised Learning Method for Intrusion Detection in Software Defined Networks -- Chapter 8. Deep Reinforcement Learning Modeling of a V2V communication-based Bike Avoidance Protocol for Increased Vehicular Flow -- Chapter 9. Deep Learning-based Modeling for Pedestrian Perception and Decision Making in Refuge Island for Autonomous Driving -- Chapter 10. Machine Learning for Hate Speech Detection in Arabic Social Media -- Chapter 11. PDDL Planning and Ontologies, a Tool for Automatic Composition of Intentional-Contextual Web Services -- Chapter 12. QSAR anti-HIV Feature Selection and Prediction for Drug Discovery using Genetic Algorithm and Machine Learning Algorithms -- Chapter 13. Mining Electronic Health Records of patient using Linked Data for Ranking Diseases -- Chapter 14. Deep Neural Networks based Delay Driving the Alpha Factors Ranking based Clustering: Exploring the COVID-19 Pandemic’s Impact on the Economy and Markets -- Chapter 15. An Artificial Immune System for the Management of the Emergency Divisions.
Record Nr. UNINA-9910547297803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Homomorphic Encryption for Financial Cryptography [[electronic resource] ] : Recent Inventions and Challenges / / edited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa
Homomorphic Encryption for Financial Cryptography [[electronic resource] ] : Recent Inventions and Challenges / / edited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa
Autore Seethalakshmi V
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (302 pages)
Disciplina 005.824
Altri autori (Persone) DhanarajRajesh Kumar
SuganyadeviS
OuaissaMariya
Soggetto topico Data protection
Financial engineering
Cryptography
Data encryption (Computer science)
Data protection—Law and legislation
Data and Information Security
Financial Technology and Innovation
Cryptology
Privacy
ISBN 3-031-35535-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 -- Introduction to Homomorphic Encryption for Financial Cryptography -- Chapter 2 -- Survey on Homomorphic Encryption for Financial Cryptography Workout -- Chapter 3 Improved login interface algorithm for Financial Transactions using Visual Cryptographic Authentication -- Chapter 4 Securing shared data based on Homomorphic encryption schemes -- Chapter 5 Challenges and Opportunities associated with Homomorphic Encryption for Financial Cryptography -- Chapter 6 Homomorphic Encryption based Cloud Privacy-Preserving in Remote Ecg Monitoring and Surveillance -- Chapter 7 Enhancing Encryption Security against Cypher Attacks -- Chapter 8 Biometric Based Key Generation Using AES Algorithm for Real Time Security Applications -- Chapter 9 Financial Cryptography and its application in Blockchain -- Chapter 10 Algorithmic Strategies for Solving Complex Problems in Financial Cryptography.,- Chapter 11 Various Attacks on the implementation of Cryptographic Algorithms -- Chapter 12 A Survey on Private Keyword Sorting and Searching using Homomorphic Encryption -- Chapter 13 Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme. .
Record Nr. UNISA-996547955403316
Seethalakshmi V  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Homomorphic Encryption for Financial Cryptography : Recent Inventions and Challenges / / edited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa
Homomorphic Encryption for Financial Cryptography : Recent Inventions and Challenges / / edited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa
Autore Seethalakshmi V
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (302 pages)
Disciplina 005.824
Altri autori (Persone) DhanarajRajesh Kumar
SuganyadeviS
OuaissaMariya
Soggetto topico Data protection
Financial engineering
Cryptography
Data encryption (Computer science)
Data protection—Law and legislation
Data and Information Security
Financial Technology and Innovation
Cryptology
Privacy
ISBN 3-031-35535-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 -- Introduction to Homomorphic Encryption for Financial Cryptography -- Chapter 2 -- Survey on Homomorphic Encryption for Financial Cryptography Workout -- Chapter 3 Improved login interface algorithm for Financial Transactions using Visual Cryptographic Authentication -- Chapter 4 Securing shared data based on Homomorphic encryption schemes -- Chapter 5 Challenges and Opportunities associated with Homomorphic Encryption for Financial Cryptography -- Chapter 6 Homomorphic Encryption based Cloud Privacy-Preserving in Remote Ecg Monitoring and Surveillance -- Chapter 7 Enhancing Encryption Security against Cypher Attacks -- Chapter 8 Biometric Based Key Generation Using AES Algorithm for Real Time Security Applications -- Chapter 9 Financial Cryptography and its application in Blockchain -- Chapter 10 Algorithmic Strategies for Solving Complex Problems in Financial Cryptography.,- Chapter 11 Various Attacks on the implementation of Cryptographic Algorithms -- Chapter 12 A Survey on Private Keyword Sorting and Searching using Homomorphic Encryption -- Chapter 13 Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme. .
Record Nr. UNINA-9910736002003321
Seethalakshmi V  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Rise of Quantum Computing in Industry 6. 0 Towards Sustainability : Revolutionizing Smart Disaster Management
The Rise of Quantum Computing in Industry 6. 0 Towards Sustainability : Revolutionizing Smart Disaster Management
Autore Reddy C. Kishor Kumar
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2025
Descrizione fisica 1 online resource (286 pages)
Altri autori (Persone) NagAnindya
OuaissaMariya
BhushanBharat
HanafiahMarlia Mohd
Collana Advances in Science, Technology and Innovation Series
ISBN 9783031733505
3031733509
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910917789003321
Reddy C. Kishor Kumar  
Cham : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Soft Computing in Industry 5. 0 for Sustainability
Soft Computing in Industry 5. 0 for Sustainability
Autore Reddy C. Kishor Kumar
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (410 pages)
Altri autori (Persone) SitholeThandiwe
OuaissaMariya
ÖZERÖzen
HanafiahMarlia M
ISBN 9783031693366
9783031693359
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910908374303321
Reddy C. Kishor Kumar  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui