top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XXVI, 480 p. 149 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-03584-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data.
Record Nr. UNISA-996465385903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XXVI, 480 p. 149 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-03584-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data.
Record Nr. UNINA-9910483379903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning and Big Data Analytics : 2nd International Conference on Machine Learning and Big Data Analytics-ICMLBDA, IIT Patna, India, March 2022 / / edited by Rajiv Misra, Rana Omer, Muttukrishnan Rajarajan, Bharadwaj Veeravalli, Nishtha Kesswani, Priyanka Mishra
Machine Learning and Big Data Analytics : 2nd International Conference on Machine Learning and Big Data Analytics-ICMLBDA, IIT Patna, India, March 2022 / / edited by Rajiv Misra, Rana Omer, Muttukrishnan Rajarajan, Bharadwaj Veeravalli, Nishtha Kesswani, Priyanka Mishra
Autore Misra Rajiv
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (552 pages)
Disciplina 006.31
Altri autori (Persone) OmerRana
RajarajanMuttukrishnan
VeeravalliBharadwaj
KesswaniNishtha
MishraPriyanka
Collana Springer Proceedings in Mathematics & Statistics
Soggetto topico Mathematical statistics
Machine learning
Quantitative research
Artificial intelligence—Data processing
Mathematical Statistics
Machine Learning
Data Analysis and Big Data
Data Science
Aprenentatge automàtic
Dades massives
Soggetto genere / forma Llibres electrònics
ISBN 3-031-15175-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- A Comprehensive analysis on Mobile Edge Computing: joint offloading and resource allocation perspective -- Finding Significant Project Issues with Machine Learning -- Prediction of Heart Disease using various Data Analysis and Machine learning Techniques -- Artificial Intelligence: Recent Trends, Opportunities and Challenges in Real-World Scenarios -- Bilingual documents text line extraction using Conditional GANs -- Performance Comparison of YOLO Variants for Object Detection in Drone Based Imagery -- A Microservice Architecture with Load Balancing Mechanism in Cloud Environment -- An IoT Application for Detection and Monitoring of Manhole -- Resource Allocation in 5G & Beyond Edge-Slice Networking using Deep Reinforcement Learning -- The Important Influencing Factors in Machine Translation -- Damaged units return Investigation in Printer producing Industry utilizing Big Data -- Colorization of Grayscale Images: An Overview -- Evolutionary Approaches Towards Traditional to Deep Learning Based Chatbot -- Analysis of Machine Learning Algorithms for Detection of Cyber Bullying on Social Networks -- Sentiment Analysis of Political Tweets for Israel using Machine Learning -- A Novel Approach for Real-time Vehicle Re-identification using Content-based Image Retrieval with Relevance Feedback -- Extractive and Abstractive Text Summarization Model fine-tuned based on BERTSUM and Bio-BERT on COVID-19 Open Research Articles -- RevCode for NLP in Indian Languages -- Application for Mood Detection of Students Using TensorFlow and Electron JS -- By Using CNN Technique and Webcam to Identify Face Mask Violation -- A Review on Internet of Things based Cloud Architecture and Its Application -- Prediction of Maneuvering Status for Aerial Vehicles using Supervised Learning Methods -- HRescue: A Modern ML approach for Employee Attrition Prediction -- Using Machine Learning to Detect Botnets in Network Traffic -- Reducing Peak Electricity Demands of a Cluster of Buildings with Multi-agent Reinforcement Learning -- Virus Texture Classification using Genetic Algorithm and Pre-trained Convolutional Neural Networks -- Fog Computing enabled Internet of Things for resource optimization -- Network Media Content Model in the era of Smaft Devices -- Sentimental Analysis of Stock Market via Twitter -- Detection and Classification of Tumor Tissues in Colorectal Cancer using Pathology Images -- Challenges encountered in the implementation of machine learning in the healthcare industry -- Performance Evaluation of Deep Learning Architectures for Recognition of Moisture in Dried Coconut Copra -- Training Generative Adversarial Networks(GANs) over Parameter Server and Worker Node Architecture -- Handwritten Digit Recognition using Neural Network with Gabor Filter for Information Fusion -- FAFOC: Fog Based Energy Efficient Clustering Technique for Wireless Sensor Networks -- Evaluation of Supervised Classifiers for Fake News Detection using Twitter Dataset -- Analysis of Pest Recognition using Lightweight CNN -- Early Prediction of Alzheimer Disease Using Ensemble Learning Models -- Cattle Identification from Muzzle Print Image Pattern Using Hybrid Feature Descriptors and SVM -- Evaluate and Detection of Breast Cancer using Data Mining Models -- Lung Cancer Disease Prediction Using Machine Learning Techniques -- Video to Text Generation Using Sentence Vector and Skip Connections -- Machine Learning Techniques for COVID-19 pandemic updates for Analysis, Visualization and Prediction system -- Design and CFD Analysis of Drone Thrust with Duct -- Index.
Record Nr. UNINA-9910729895203321
Misra Rajiv  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui