Atnaujinkite slapukų nuostatas

El. knyga: Applications and Techniques in Information Security: 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers

Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

?This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30–31, 2022.

The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
Privacy and Security.- Reinforcement Technique for Classifying Quasi and
Non-Quasi Attributes for Privacy Preservation and Data
Protection.- Non-malleable Codes from Authenticated Encryption in Split-State
Model.- Continuously Non-Malleable Codes from Authenticated Encryptions in
2-Split-State Model.- Deep Learning based Differential Classifier of PRIDE
and RC5.- A Better MixColumns Matrix to AES Against Differential Fault
Analysis Attack.- Variants of Crypto-Jacking Attacks and their detection
techniques.- Comparative Study of Sentiment Analysis on Cyber Security
Related Multi-Sourced Data in Social Media Platforms.- Modified Blowfish
Encryption Algorithm for Wireless Body Area Network.- EyeEncrypt: A
Cyber-Secured Framework for Retinal Image Segmentation.- Cosine Similarity
based Group Movie Recommendation Scheme considering Privacy of
Users.- Enhancing Face Recognition Accuracy using the ED-FFP Extraction
Method and Ensemble Learning for Forensics and Cyber Security.- Intrusion
Detection Using Federated Learning.- Advances in Machine Learning.- A
Comparative Analysis of Classification Algorithms used for predicting
Parkinsons Disease.- Optimization of Cluster based Charging dynamics and
routing of EV using Deep RNN.- Analysis and Prognosis of Water Quality for
River Ganga using Water Quality Index.- Detection of Android Ransomware using
Machine Learning Approach.- Cyber Security and Layering of Medical Data Using
Machine Learning Algorithms.- Analysis on Classification of Handwritten
Devanagari Characters using Deep Learning Models.- Cloud, IoT and Computing
Technologies.- Analysis and Comparison of Different Frontend
Frameworks.- Lightweight Capability-Based Access control for Internet of
Things (IoT).- Securing IoT using blockchain.- Vikas: A Multimodal framework
to Aid in Effective Disaster Management.- Discovery ofRare Itemsets using
Hyper-Linked Data Structure: A Parallel Approach.