000
|
|
nam5i |
001
|
|
2210080935260 |
003
|
|
DE-He213 |
005
|
|
20250321105515 |
007
|
|
cr nn 008mamaa |
008
|
|
241103s2025 si | s |||| 0|eng d |
020
|
|
▼a9789819797431▼9978-981-97-9743-1 |
024
|
|
▼a10.1007/978-981-97-9743-1▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aQA76.9.A25 |
072
|
|
▼aUR▼2bicssc |
072
|
|
▼aUTN▼2bicssc |
072
|
|
▼aCOM053000▼2bisacsh |
072
|
|
▼aUR▼2thema |
072
|
|
▼aUTN▼2thema |
082
|
|
▼a005.8▼223 |
245
|
00 |
▼aApplications and Techniques in Information Security▼h[electronic resource] :▼b14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024, Proceedings /▼cedited by V.S. Shankar Sriram, Anila Glory H., Gang Li, Shiva Raj Pokhrel. |
250
|
|
▼a1st ed. 2025. |
264
|
|
▼aSingapore :▼bSpringer Nature Singapore :▼bImprint: Springer,▼c2025. |
300
|
|
▼aXIII, 342 p. 192 illus., 108 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aCommunications in Computer and Information Science,▼x1865-0937 ;▼v2306 |
505
|
|
▼a -- Security of Emerging Technologies in Computer Networks. -- Advancing Quantum Computing and Cryptography. -- Optical Neural Networks – A Strategy for Secure Quantum Computing. -- Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations. -- Cryptographic Distinguishers through Deep Learning for Lightweight Block Ciphers. -- Detection and Mitigation of Email Phishing. -- Securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence Techniques. -- Design of Image Encryption Technique Using MSE Approach. -- Low Latency Binary Edward Curve Crypto processor for FPGA platforms. -- Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions. -- AI-Driven Cybersecurity: The Role of Machine Learning. -- Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data. -- DDOS Attack Detection in Virtual Machine Using Machine Learning Algorithms. -- An Unsupervised Method for Intrusion Detection using Novel Percentage Split Clustering. -- HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention Mechanisms. -- Silent Threats: Monitoring Insider Risks in Healthcare Sector. -- Advancing Cybersecurity with Deep Learning Techniques. -- Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns. -- Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities. -- Enhancing FGSM Attacks with Genetic Algorithms for Robust Adversarial Examples in Remote Sensing Image Classification Systems. -- GAN-Enhanced Multiclass Malware Classification with Deep Convolutional Networks. -- Securing Connected Systems: IoT, Cloud, and Web Security Strategies. -- IOT Based Locker Access System with MFA Remote Authentication. -- A Secure Authentication Scheme between Edge Devices using HyperGraph Hashing Technique in IoT Environment. -- Enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority System. -- Securing Data in MongoDB: A Framework Using Encryption. -- Handling Sensitive Medical Data – A Differential Privacy enabled Federated Learning Approach. -- Securing your Web Applications: The Power of Bugbite Vulnerability Scanner. |
520
|
|
▼aThis book constitutes the refereed proceedings of the 14th International Conference, on Applications and Techniques in Information Security, ATIS 2024, held in Tamil Nadu, India, November 22-24, 2024. The 24 full papers presented were carefully reviewed and selected from 149 submissions. The conference focuses on Advancing Quantum Computing and Cryptography; AI-Driven Cybersecurity: The Role of Machine Learning; Advancing Cybersecurity with Deep Learning Techniques; and Securing Connected Systems: IoT, Cloud, and Web Security Strategies. |
650
|
|
▼aData protection. |
650
|
|
▼aArtificial intelligence. |
650
|
|
▼aComputer networks . |
650
|
|
▼aEducation▼xData processing. |
650
|
|
▼aComputer engineering. |
650
|
|
▼aData and Information Security. |
650
|
|
▼aArtificial Intelligence. |
650
|
|
▼aComputer Communication Networks. |
650
|
|
▼aComputers and Education. |
650
|
|
▼aComputer Engineering and Networks. |
700
|
|
▼aShankar Sriram, V.S.▼eeditor.▼0(orcid)0000-0001-7870-7944▼1https://orcid.org/0000-0001-7870-7944▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aH., Anila Glory.▼eeditor.▼0(orcid)0000-0002-0313-6275▼1https://orcid.org/0000-0002-0313-6275▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aLi, Gang.▼eeditor.▼0(orcid)0000-0003-1583-641X▼1https://orcid.org/0000-0003-1583-641X▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aPokhrel, Shiva Raj.▼eeditor.▼0(orcid)0000-0001-5819-765X▼1https://orcid.org/0000-0001-5819-765X▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9789819797424 |
776
|
|
▼iPrinted edition:▼z9789819797448 |
830
|
|
▼aCommunications in Computer and Information Science,▼x1865-0937 ;▼v2306 |
856
|
|
▼uhttps://doi.org/10.1007/978-981-97-9743-1 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |