Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "Machine Learning"
![]() |
|
Link zu diesem Datensatz | https://d-nb.info/1363774573 |
Titel | Artificial Intelligence Based Smart and Secured Applications : Third International Conference, ASCIS 2024, Rajkot, India, October 16–18, 2024, Revised Selected Papers, Part VI / edited by Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja, Pankaj Mudholkar |
Person(en) |
Rajagopal, Sridaran (Herausgeber) Popat, Kalpesh (Herausgeber) Meva, Divyakant (Herausgeber) Bajeja, Sunil (Herausgeber) Mudholkar, Pankaj (Herausgeber) |
Organisation(en) | SpringerLink (Online service) (Sonstige) |
Ausgabe | 1st ed. 2025 |
Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
Zeitliche Einordnung | Erscheinungsdatum: 2025 |
Umfang/Format | Online-Ressource, LIV, 478 p. 213 illus., 141 illus. in color. : online resource. |
Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-031-86304-2 Printed edition:: ISBN: 978-3-031-86306-6 |
Inhalt | -- Cyber Security. -- Automation of Endpoint Security using Machine Learning. -- Comparative Analysis of Vulnerability and Threats related to Blogging Platforms. -- Cybersecurity Threats to Autonomous Vehicles: A Deep Learning Approach. -- Advanced Threat Intelligence Systems for Early Warning of Cyber Hacking. -- Reconciliation - Backdoor Access finding strategies with Legacy applications. -- Enhancing Cyber Hacking Breach Classification through Integrated Preprocessing and feature Extraction Technique. -- An Ensemble Method for Insider Threat Detection based On User Activities Analysis Using Bi-LSTM and GA Optimization. -- Systemization of Knowledge: Privacy Preservation for Decentralized Non-Financial Applications. -- Identifying Application-Level Distributed Denial-Of-Service (DDoS) Attacks With Machine Learning (ML). -- Cybersecurity Threats and Trust Dynamics in Digital Payment Systems: An Analysis of Domestic Fraud and User Perspectives. -- Enhanced Web Browser Forensics: Innovative Methodology for Evidence Collection and Analysis. -- DDOS attack detection and prevention using MIEC method in SDN environment. -- A lossless image, video and audio encryption method based hybrid chaotic map and DNA encryption. -- Enhancing Cloud Security for Structured Data: An AES-GCM Based Format-Preserving Encryption Approach. -- Hacktivism or Cyber Warfare? Decoding the Motivations Behind Cyber Attacks Targeting Israel. -- Designing a Secure E-Voting System with Ganache: Challenges and Solutions. -- Computer Application for Sustainability. -- Consumer Usage Intention Factors for Mobile Food- Delivery Applications Using Task Technology Fit Approach. -- Optimizing Query Execution Time in Relational Databases Using Cost-Based and Index Merge Strategies: A Case Study on E-Commerce Data. -- Securing Sign-Up and Sign-In in the Indian Market: Fraud Prevention in CIAM for CRM - A Comprehensive Review and Future Directions. -- MERN Stack Website For Government Officials. -- Brain Tumor Diagnosis using Deep Learning: A Systematic Review and Meta- Analysis of MRI Image-Based Studies. -- A STUDY ON EMPLOYEE ENGAGEMENT FACTORS OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) WORKFORCE. -- A Simulated Manufacturing Study on Rope Size and Number of Splits on the Productivity while Applying the Simplified Drum-Buffer-Rope Methodology. -- Effect of Technology Acceptance among Employees in the Second Half of their Working Life. -- A Study on the Effects of Social Media Platforms on Graduate Students' Academic Achievement. -- Enhancement of Forest Fire Assessment by KDCPMNN Approach in Sikkim, India Using Remote Sensing Images. -- Decentralized Payment Gateway: Bridging DeFi with Metamask. -- Impact of Social Media Marketing in the Cosmetic Industry to Cross the Chasm in India. -- Ubiquitous Computing of Low-Cost Pollutant Sensors for Monitoring Pollutant Gases in the Construction Sector. -- Envisioning the AI-Driven Future: A Delphi Study on the Transformative Role of Artificial Intelligence in Higher Education. -- IoT Integration for Smart Agriculture: Prioritizing Key Factors using WASPAS Approach. -- Transforming EHR Systems Using the HyperLedger Fabric Blockchain Framework |
Persistent Identifier |
URN: urn:nbn:de:101:1-2504230406539.073568167675 DOI: 10.1007/978-3-031-86305-9 |
URL | https://doi.org/10.1007/978-3-031-86305-9 |
ISBN/Einband/Preis | 978-3-031-86305-9 |
Sprache(n) | Englisch (eng) |
Beziehungen | Communications in Computer and Information Science ; 2429 |
DDC-Notation | 004 (maschinell ermittelte DDC-Kurznotation) |
Sachgruppe(n) | 004 Informatik |
Online-Zugriff | Archivobjekt öffnen |
