Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "Machine Learning"
![]() |
|
Link zu diesem Datensatz | https://d-nb.info/1347219404 |
Titel | Applications and Techniques in Information Security : 14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024, Proceedings / edited by V.S. Shankar Sriram, Anila Glory H., Gang Li, Shiva Raj Pokhrel |
Person(en) |
Shankar Sriram, V.S (Herausgeber) H., Anila Glory (Herausgeber) Li, Gang (Herausgeber) Pokhrel, Shiva Raj (Herausgeber) |
Organisation(en) | SpringerLink (Online service) (Sonstige) |
Ausgabe | 1st ed. 2025 |
Verlag | Singapore : Springer Nature Singapore, Imprint: Springer |
Zeitliche Einordnung | Erscheinungsdatum: 2025 |
Umfang/Format | Online-Ressource, XIII, 342 p. 192 illus., 108 illus. in color. : online resource. |
Andere Ausgabe(n) |
Printed edition:: ISBN: 978-981-9797-42-4 Printed edition:: ISBN: 978-981-9797-44-8 |
Inhalt | -- Security of Emerging Technologies in Computer Networks. -- Advancing Quantum Computing and Cryptography. -- Optical Neural Networks – A Strategy for Secure Quantum Computing. -- Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations. -- Cryptographic Distinguishers through Deep Learning for Lightweight Block Ciphers. -- Detection and Mitigation of Email Phishing. -- Securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence Techniques. -- Design of Image Encryption Technique Using MSE Approach. -- Low Latency Binary Edward Curve Crypto processor for FPGA platforms. -- Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions. -- AI-Driven Cybersecurity: The Role of Machine Learning. -- Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data. -- DDOS Attack Detection in Virtual Machine Using Machine Learning Algorithms. -- An Unsupervised Method for Intrusion Detection using Novel Percentage Split Clustering. -- HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention Mechanisms. -- Silent Threats: Monitoring Insider Risks in Healthcare Sector. -- Advancing Cybersecurity with Deep Learning Techniques. -- Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns. -- Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities. -- Enhancing FGSM Attacks with Genetic Algorithms for Robust Adversarial Examples in Remote Sensing Image Classification Systems. -- GAN-Enhanced Multiclass Malware Classification with Deep Convolutional Networks. -- Securing Connected Systems: IoT, Cloud, and Web Security Strategies. -- IOT Based Locker Access System with MFA Remote Authentication. -- A Secure Authentication Scheme between Edge Devices using HyperGraph Hashing Technique in IoT Environment. -- Enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority System. -- Securing Data in MongoDB: A Framework Using Encryption. -- Handling Sensitive Medical Data – A Differential Privacy enabled Federated Learning Approach. -- Securing your Web Applications: The Power of Bugbite Vulnerability Scanner |
Persistent Identifier |
URN: urn:nbn:de:101:1-2411050321356.951512189850 DOI: 10.1007/978-981-97-9743-1 |
URL | https://doi.org/10.1007/978-981-97-9743-1 |
ISBN/Einband/Preis | 978-981-97-9743-1 |
Sprache(n) | Englisch (eng) |
Beziehungen | Communications in Computer and Information Science ; 2306 |
DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
Sachgruppe(n) | 004 Informatik |
Online-Zugriff | Archivobjekt öffnen |
