Computing Science, Communication and Security

Computing Science, Communication and Security portes grátis

Computing Science, Communication and Security

6th International Conference, COMS2 2025, Mehsana, Gujarat, India, September 12-13, 2025, Proceedings

Thampi, Sabu M.; Chaubey, Nirbhay; Amin, Kiran; Jhanjhi, Noor Zaman; Parikh, Satyen

Springer Nature Switzerland AG

02/2026

386

Mole

Inglês

9783032160379

15 a 20 dias

Descrição não disponível.
.- Network and Communication Security.


.- Game-Theoretic and Formal Approaches to Securing Non-Human Accounts in Identity and Access Management.


.- IoT-Based Automated Irrigation with Machine Learning for Crop Recommendation, Soil Classification, and Disease Detection.


.- Image Steganalysis using Siamese Contrastive Learning Network and Pix2Pix GAN with Linear Predictive Coding.


.- A Reinforcement Learning-Based Energy-Aware Hy brid Routing Protocol (RL-EAHR) for Enhancing Net work Lifetime, Scalability, and Resilience in Mobile Ad Hoc Networks (MANETs).


.- A Generative Method for Steganography by Cover Synthesis with Secure System.


.- Secure and Dynamic Routing in Mobile Ad-Hoc Networks through Cryptographic Assurance.


.- Optimizing IoT Networks: Insights from Compara tive Analysis in Terrestrial and Underwater Acoustic En vironments.


.- Enhancing Privacy and Security in Blockchain-Driven NFT Marketplaces Using Zero Knowledge Proof.


.- DeepXDetect: Real-Time Sandbox Malware Detection with Explainable AI.


.- Optimizing Base Station Placement to Minimize Interference for Satellite Terrestrial Networks (STN).


.- Grouped Photon Quantum Key Distribution: An Improvised BB84 Protocol.


.- Optimized Multi-Process Computing for Efficient Multimodal Biometric Security System.


.- Design, Implementation and Verification of UART with APB Slave Interface using Verilog.


.- An adaptive promiscuous mode-oriented watchdog mechanism with a route rater for secure and reliable route identification in VANETs.


.- Development and UVM-Based Functional Verification of a Scalable & Configurable UART VIP.


.- Design and Verification of a Modified Numerically Controlled Oscillator for Clock Recovery in a Digital SerDes Receiver on an FPGA.


.- Computing Science.


.- Behavioral Biometrics: A Comparison of Keystroke Dynamics and Mouse Trajectories for Bot Detection.


.- A Chaos-Based Technique with Reversible Data Hiding for Enhanced Security of Medical Data.


.- Quantum-Resistant Image Encryption Using Adaptive Signal Transform and Generative Learning.


.- An Exhaustive Analysis of Machine Learning and Deep Learning for Credit Card Fraud Detection: Methodologies, Performance, and Challenges.


.- Real-time Path Deviation Detection System Using Blockchain Technology for Mission Critical Applications.


.- Secure Post-Quantum Authentication for Wearable Healthcare Devices.


.- Optimizing GIF Steganography with Deep Learning for Superior Image Concealment.


.- Deep Learning-Enhanced Boosting-Based Ensemble Model for Phishing Detection.


.- Securing Collaboration: Federated Learning with Homomorphic Encryption.


.- Decentralized Identity Federation Using Blockchain for Cross-Organizational Access.


.- Dynamic GCN-TCN-CapsNet: A Lightweight Hybrid Model for Real-Time Gait Recognition.


.- Smart Lab Optimization using Digital Twins and Ubiquitous Computing.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Internet of Things;Deep Learning;Blockchain;Cybersecurity;Federated Learning;Quantum Key Distribution;Identity and Access Management;Vehicular Networks;Secure Routing;MANETs;AODV;Digital Twin;Homomorphic Encryption;Machine Learning;Image Steganalysis;System Verilog/UVM;Multimodal Biometrics;Reinforcement Learning;Digital Transformation;Control