Applications and Techniques in Information Security

Applications and Techniques in Information Security

14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024, Proceedings

Pokhrel, Shiva Raj; Shankar Sriram, V.S.; Li, Gang; H., Anila Glory

Springer Verlag, Singapore

12/2024

330

Mole

9789819797424

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Security of Emerging Technologies in Computer Networks.



.- Advancing Quantum Computing and Cryptography.



.- Optical Neural Networks - A Strategy for Secure Quantum Computing.



.- Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations.



.- Cryptographic Distinguishers through Deep Learning for Lightweight Block Ciphers.



.- Detection and Mitigation of Email Phishing.



.- Securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence Techniques.



.- Design of Image Encryption Technique Using MSE Approach.



.- Low Latency Binary Edward Curve Crypto processor for FPGA platforms.



.- Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions.



.- AI-Driven Cybersecurity: The Role of Machine Learning.



.- Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data.



.- DDOS Attack Detection in Virtual Machine Using Machine Learning Algorithms.



.- An Unsupervised Method for Intrusion Detection using Novel Percentage Split Clustering.



.- HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention Mechanisms.



.- Silent Threats: Monitoring Insider Risks in Healthcare Sector.



.- Advancing Cybersecurity with Deep Learning Techniques.



.- Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns.



.- Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities.



.- Enhancing FGSM Attacks with Genetic Algorithms for Robust Adversarial Examples in Remote Sensing Image Classification Systems.



.- GAN-Enhanced Multiclass Malware Classification with Deep Convolutional Networks.



.- Securing Connected Systems: IoT, Cloud, and Web Security Strategies.



.- IOT Based Locker Access System with MFA Remote Authentication.



.- A Secure Authentication Scheme between Edge Devices using HyperGraph Hashing Technique in IoT Environment.



.- Enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority System.



.- Securing Data in MongoDB: A Framework Using Encryption.



.- Handling Sensitive Medical Data - A Differential Privacy enabled Federated Learning Approach.



.- Securing your Web Applications: The Power of Bugbite Vulnerability Scanner.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Quantum Computing;Quantum Cryptography;Insider Threat Detection;Intrusion Detection System;Image Security;Web Security;IoT Security;Cloud Security;Advanced Persistent Threat;Machine Learning/Deep Learning for Cyber Security ;Threat Intelligence