Security Analytics

Security Analytics

A Data Centric Approach to Information Security

Khurana, Mehak; Mahajan, Shilpa

Taylor & Francis Ltd

06/2022

224

Dura

Inglês

9781032072418

15 a 20 dias

840

Descrição não disponível.
1. A reliable blockchain application for Music in a decentralized Network. 2. An authentic data centric application for medical store. 3. Intelligent Data Analytic Approach for Restaurant Recommendation. 4. Investigation on Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical encryption of images using partial pivoting lower upper decomposition based on two structured deterministic phase masks in the hybrid transform domain. 7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8. Blockchain: A next power-driven technology for smart cities. 9. Mutual surf scaling factor features analysis for detecting DDOS attacks based on lattice behavioral using spread spectral soft-max-recurrent neural network. 10. Provably Secure Role Delegation Scheme for Medical Cyber Physical System. 11. FRAME Routing Protocol to handle security attacks in Wireless Sensor Networks. 12. A Blockchain security management based Rehashing shift code Rail encryption using circular shift round random padding key for decentralized cloud environment. 13. Application of Exact Barrier-Penalty Function for developing privacy mechanism in cyber physical system.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Machine Learning;Cyber Security;Blockchain;Network Security;Mobile Security;Security in IoT;Cloud Security;Web and Mobile Security;Security in Data Analytics;Universal Subscriber Identity Module;Blockchain Technology;Smart Contracts;Left Handed Transmission Line;IoT Application;Malicious Nodes;MPA;IoT Device;Mobile Forensics;Cps;Frt;Encrypted Images;Decrypted Images;Exact Penalty Function;Nodes Increases;Routing Protocol;UACI;IoT System;Phase Mask;Smart Cities;Electromagnetic Band Gap Structure;Differential Privacy;Sim Card;Rectangular Microstrip Antenna;Proxy Signature