Cyber Warfare, Security and Space Computing
Cyber Warfare, Security and Space Computing
Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22-23, 2024, Proceedings
Pljonkin, Anton; Joshi, Sandeep; Radenkovic, Milena; Bairwa, Amit Kumar
Springer International Publishing AG
11/2024
379
Mole
9783031734939
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- Hybrid Deep Driven Cross Industry Sentiment Analysis Model for Netizen's Behavioral Characterization.
.- Fake Product Detection using Blockchain with Encryption and AI.
.- S-Defender: A Smishing Detection Approach in Mobile Environment.
.- Mathematical Socio Analysis of Cybercrimes Preparedness A simulation Odessey with R.
.- Revolutionizing Weather Forecasting: Harnessing Machine Learning and Big Data in Upcoming Technologies.
.- Trends in Drowsiness Detection & Analysis of the Different Technologies Engaged.
.- Detecting Local Software Issues Using NSGA Multi-Optimization.
.- Deep Learning and IoT Based Robotics to Monitor the Traffic.
.- Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain Family.
.- Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device.
.- Development of Elliptical Cryptography Technique to Watermark Embedded and extrusion for Healthcare Records.
. -Step-by-Step Image Encryption Using Uaci and Pixadpt.
.- Investigation of Post - Quantum Cryptography to Secure the Functionality of Vehicle Hardware Architecture.
.- Secure Data Management Using BlockChain.
.- Navigating through Digital Realm: Role of Cyberpsychology in Fostering Mental Well-being & Digital Empathy.
.- An Empirical Analysis of Neighborhood-based Approaches for Trustworthy Recommendations with Apache Mahout.
.- Multilingual Sentiment Analysis over Real-time Voice.
.- Identity Verification: A Decentralized KYC Approach Using Blockchain.
.- A Neural Network-based Facial Expressions Detection Technique using CK+ Dataset.
.- Cyber Security Challenges in Industrial Settings with the Internet of Things.
.- Designing Secure Software-Defined Network, Resistant to DDoS Attack Using Non-Linear Routing Rule Installation.
.- NPQuant: A Robust Quantum Inspired Computation Algorithms as an efficient solution to NP-Complete Problems.
.- Impact of Sentiment Analysis in E-Commerce and Cybersecurity.
.- Cultivating Cyber Vigilance: Shaping Employee Behavior for Security Success .
.- A Deep Learning Approach to PDF Malware Detection Enhanced with XAI.
.- Optimized Deep Learning Technique for the Effective Detection of Windows PE malware.
.- Hybrid Deep Driven Cross Industry Sentiment Analysis Model for Netizen's Behavioral Characterization.
.- Fake Product Detection using Blockchain with Encryption and AI.
.- S-Defender: A Smishing Detection Approach in Mobile Environment.
.- Mathematical Socio Analysis of Cybercrimes Preparedness A simulation Odessey with R.
.- Revolutionizing Weather Forecasting: Harnessing Machine Learning and Big Data in Upcoming Technologies.
.- Trends in Drowsiness Detection & Analysis of the Different Technologies Engaged.
.- Detecting Local Software Issues Using NSGA Multi-Optimization.
.- Deep Learning and IoT Based Robotics to Monitor the Traffic.
.- Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain Family.
.- Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device.
.- Development of Elliptical Cryptography Technique to Watermark Embedded and extrusion for Healthcare Records.
. -Step-by-Step Image Encryption Using Uaci and Pixadpt.
.- Investigation of Post - Quantum Cryptography to Secure the Functionality of Vehicle Hardware Architecture.
.- Secure Data Management Using BlockChain.
.- Navigating through Digital Realm: Role of Cyberpsychology in Fostering Mental Well-being & Digital Empathy.
.- An Empirical Analysis of Neighborhood-based Approaches for Trustworthy Recommendations with Apache Mahout.
.- Multilingual Sentiment Analysis over Real-time Voice.
.- Identity Verification: A Decentralized KYC Approach Using Blockchain.
.- A Neural Network-based Facial Expressions Detection Technique using CK+ Dataset.
.- Cyber Security Challenges in Industrial Settings with the Internet of Things.
.- Designing Secure Software-Defined Network, Resistant to DDoS Attack Using Non-Linear Routing Rule Installation.
.- NPQuant: A Robust Quantum Inspired Computation Algorithms as an efficient solution to NP-Complete Problems.
.- Impact of Sentiment Analysis in E-Commerce and Cybersecurity.
.- Cultivating Cyber Vigilance: Shaping Employee Behavior for Security Success .
.- A Deep Learning Approach to PDF Malware Detection Enhanced with XAI.
.- Optimized Deep Learning Technique for the Effective Detection of Windows PE malware.