ACM journal of computer documentation |
Pubbl/distr/stampa | New York, NY, : Association for Computing Machinery, ©2000- |
Disciplina | 004.2 |
Soggetto topico |
Electronic data processing documentation
Informatique - Documentation Hardware |
Soggetto genere / forma | Periodicals. |
ISSN | 1557-9441 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996215883203316 |
New York, NY, : Association for Computing Machinery, ©2000- | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
ACM journal of computer documentation |
Pubbl/distr/stampa | New York, NY, : Association for Computing Machinery, ©2000- |
Disciplina | 004.2 |
Soggetto topico |
Electronic data processing documentation
Informatique - Documentation Dokumentation Informatik Hardware Informàtica Documentació |
Soggetto genere / forma |
Periodicals.
Revistes electròniques. |
ISSN | 1557-9441 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Association for Computing Machinery journal of computer documentation
Journal of computer documentation JCD |
Record Nr. | UNINA-9910375872803321 |
New York, NY, : Association for Computing Machinery, ©2000- | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advancements in smart computing and information security : first international conference, ASCIS 2022, Rajkot, India, November 24-26, 2022, revised selected papers, part II / / edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (315 pages) |
Disciplina | 330 |
Collana | Communications in Computer and Information Science |
Soggetto topico | Hardware |
ISBN | 3-031-23095-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR & -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References.
EXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature. 7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security. 4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications. 1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture. 4 Results and Discussion. |
Record Nr. | UNISA-996508667503316 |
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Automated support requirement system : user's guide for nondata entry personnel / / John E. Maryland |
Autore | Maryland John E., Jr. |
Pubbl/distr/stampa | John F. Kennedy Space Center, [FL] : , : National Aeronautics and Space Administration, John F. Kennedy Space Center, , March 1985 |
Descrizione fisica | 1 online resource (66 unnumbered pages) |
Collana | NASA/TM |
Soggetto topico |
Computers
Hardware Computer systems programs |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Automated support requirement system |
Record Nr. | UNINA-9910715230503321 |
Maryland John E., Jr.
![]() |
||
John F. Kennedy Space Center, [FL] : , : National Aeronautics and Space Administration, John F. Kennedy Space Center, , March 1985 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
A bitvectors library for PVS / / Ricky W. Butler [and four others] |
Autore | Butler Ricky W. |
Pubbl/distr/stampa | Washington, D.C., : National Aeronautics and Space Administration, 1996 |
Descrizione fisica | 1 online resource (17 pages) : illustrations |
Collana | NASA technical memorandum |
Soggetto topico |
Hardware
Proving Bit synchronization Integers Libraries |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910707834703321 |
Butler Ricky W.
![]() |
||
Washington, D.C., : National Aeronautics and Space Administration, 1996 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Building supply business |
Pubbl/distr/stampa | Des Plaines, IL, : Cahners Pub. Co., c1995-c1996 |
Descrizione fisica | 1 online resource |
Disciplina | 381/.45683 |
Soggetto topico |
Hardware
Building Building materials |
Soggetto genere / forma | Periodicals. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | Building supply |
Record Nr. | UNISA-996335773703316 |
Des Plaines, IL, : Cahners Pub. Co., c1995-c1996 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Child, Farr & Co. (To accompany Bill H.R. No. 286.) May 16, 1850 |
Pubbl/distr/stampa | [Washington, D.C.] : , : [publisher not identified], , 1850 |
Descrizione fisica | 1 online resource (1 page) |
Altri autori (Persone) | PhoenixJonas Phillips <1788-1859> (Whig (NY)) |
Collana |
House report / 31st Congress, 1st session. House
[United States congressional serial set ] |
Soggetto topico |
Claims
Malicious mischief Vandalism Drawbacks Fires Hardware Steamboats Tariff Merchants |
Soggetto genere / forma | Legislative materials. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Child, Farr & Co. |
Record Nr. | UNINA-9910715775003321 |
[Washington, D.C.] : , : [publisher not identified], , 1850 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Development of space telescope non-ORU hardware [[electronic resource] ] : final report / / prepared by Kem B. Robertson, David E. Henderson |
Autore | Robertson Kem B |
Pubbl/distr/stampa | Huntsville, Ala. : , : Essex Corporation, Space Systems Group : , : National Aeronautics and Space Administration, George C. Marshall Space Flight Center, , [1985] |
Descrizione fisica | 1 online resource (iii, 5 pages, 25 unnumbered pages) : illustrations |
Altri autori (Persone) | HendersonDavid E |
Collana | [NASA contractor report] |
Soggetto topico |
Hardware
Hubble Space Telescope Orbital servicing Replacing |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Development of space telescope non-ORU hardware |
Record Nr. | UNINA-9910701848603321 |
Robertson Kem B
![]() |
||
Huntsville, Ala. : , : Essex Corporation, Space Systems Group : , : National Aeronautics and Space Administration, George C. Marshall Space Flight Center, , [1985] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering evaluations and studies : final report : volume I, exhibit A / / Unjeng Cheng [and ten others] |
Autore | Unjeng Cheng |
Pubbl/distr/stampa | Houston, Texas : , : NASA Lyndon B. Johnson Space Center, , October 1983 |
Descrizione fisica | 1 online resource (various pagings) : illustrations |
Collana | NASA/CR |
Soggetto topico |
Centaur launch vehicle
Inertial Upper Stage Superhigh frequencies Space Shuttle orbiters Hardware |
Soggetto genere / forma | Online resources. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Engineering evaluations and studies |
Record Nr. | UNINA-9910709861103321 |
Unjeng Cheng
![]() |
||
Houston, Texas : , : NASA Lyndon B. Johnson Space Center, , October 1983 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Game theory for networks : 11th international EAI conference, gamenets 2022, virtual event, July 7-8, 2022, proceedings / / edited by Fang Fang and Fu Shu |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (374 pages) |
Disciplina | 330 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico | Hardware |
ISBN | 3-031-23141-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wireless Networks -- Block-chain Abnormal Transaction Detection Method Based on Dynamic Graph Representation -- Multi-service communication isolation of underground pipe gallery based on WiFi6 -- MU-PDR: A Method of Fingerprint Passive Positioning for WiFi6 Based on MU-RTS/CTS -- The Optimal Layer of User-Specific Reconfigurable Intelligent Surfaces Structure for Uplink Communication System -- A Sophisticated Anti-Jamming Strategy for a Joint Radar and Communication System -- Internet of Things -- Power data credible decision-making mechanism based on federated learning and blockchain -- A Service Protection Mechanism of Deterministic Networking Based on Segment Routing -- Cloud-edge collaboration based power IoT scene perception mechanism -- Task allocation mechanism of power Internet of things based on edge routing optimization -- Voluntary Data Preservation Mechanism in Base Station-less Sensor Networks -- Design and Implementation of Targeted Poverty Alleviation System Based on Blockchain Network -- An Intent-based Routing Scheme in Satellite IoT -- Game Theory -- Interference Management in Terrestrial-Satellite Networks Using Stackelberg Game -- Optimal Resource Allocation for Computation Offloading in Maritime Communication Networks: An Energy-Efficient Design via Matching Game -- Game Theoretic Analysis of Resource Allocation in Multi-tiered Networks -- Energy-Efficient Multi-Cell NOMA Design via Coalition Formation Game -- The vaccination Game in SIS networks with multipopulations -- A Stochastic Bandwidth Scanning Game -- Port Capacity Leasing Games at Internet Exchange Points -- A Phase Transition in Large Network Games -- Dynamic Pricing for Tenants in an Automated Slicing Marketplace -- Service Function Chain Placement in Cloud Data Center Networks: a Cooperative Multi-Agent Reinforcement Learning Approach -- The Art of Concession in General Lotto Games -- Providing slowdown information to improve selfish routing -- Budgeted Adversarial Network Resource Utilization Games. |
Record Nr. | UNISA-996508667203316 |
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|