Computing Science, Communication and Security
Computing Science, Communication and Security
6th International Conference, COMS2 2025, Mehsana, Gujarat, India, September 12-13, 2025, Proceedings
Thampi, Sabu M.; Chaubey, Nirbhay; Amin, Kiran; Jhanjhi, Noor Zaman; Parikh, Satyen
Springer Nature Switzerland AG
02/2026
386
Mole
Inglês
9783032160379
15 a 20 dias
.- Game-Theoretic and Formal Approaches to Securing Non-Human Accounts in Identity and Access Management.
.- IoT-Based Automated Irrigation with Machine Learning for Crop Recommendation, Soil Classification, and Disease Detection.
.- Image Steganalysis using Siamese Contrastive Learning Network and Pix2Pix GAN with Linear Predictive Coding.
.- A Reinforcement Learning-Based Energy-Aware Hy brid Routing Protocol (RL-EAHR) for Enhancing Net work Lifetime, Scalability, and Resilience in Mobile Ad Hoc Networks (MANETs).
.- A Generative Method for Steganography by Cover Synthesis with Secure System.
.- Secure and Dynamic Routing in Mobile Ad-Hoc Networks through Cryptographic Assurance.
.- Optimizing IoT Networks: Insights from Compara tive Analysis in Terrestrial and Underwater Acoustic En vironments.
.- Enhancing Privacy and Security in Blockchain-Driven NFT Marketplaces Using Zero Knowledge Proof.
.- DeepXDetect: Real-Time Sandbox Malware Detection with Explainable AI.
.- Optimizing Base Station Placement to Minimize Interference for Satellite Terrestrial Networks (STN).
.- Grouped Photon Quantum Key Distribution: An Improvised BB84 Protocol.
.- Optimized Multi-Process Computing for Efficient Multimodal Biometric Security System.
.- Design, Implementation and Verification of UART with APB Slave Interface using Verilog.
.- An adaptive promiscuous mode-oriented watchdog mechanism with a route rater for secure and reliable route identification in VANETs.
.- Development and UVM-Based Functional Verification of a Scalable & Configurable UART VIP.
.- Design and Verification of a Modified Numerically Controlled Oscillator for Clock Recovery in a Digital SerDes Receiver on an FPGA.
.- Computing Science.
.- Behavioral Biometrics: A Comparison of Keystroke Dynamics and Mouse Trajectories for Bot Detection.
.- A Chaos-Based Technique with Reversible Data Hiding for Enhanced Security of Medical Data.
.- Quantum-Resistant Image Encryption Using Adaptive Signal Transform and Generative Learning.
.- An Exhaustive Analysis of Machine Learning and Deep Learning for Credit Card Fraud Detection: Methodologies, Performance, and Challenges.
.- Real-time Path Deviation Detection System Using Blockchain Technology for Mission Critical Applications.
.- Secure Post-Quantum Authentication for Wearable Healthcare Devices.
.- Optimizing GIF Steganography with Deep Learning for Superior Image Concealment.
.- Deep Learning-Enhanced Boosting-Based Ensemble Model for Phishing Detection.
.- Securing Collaboration: Federated Learning with Homomorphic Encryption.
.- Decentralized Identity Federation Using Blockchain for Cross-Organizational Access.
.- Dynamic GCN-TCN-CapsNet: A Lightweight Hybrid Model for Real-Time Gait Recognition.
.- Smart Lab Optimization using Digital Twins and Ubiquitous Computing.
.- Game-Theoretic and Formal Approaches to Securing Non-Human Accounts in Identity and Access Management.
.- IoT-Based Automated Irrigation with Machine Learning for Crop Recommendation, Soil Classification, and Disease Detection.
.- Image Steganalysis using Siamese Contrastive Learning Network and Pix2Pix GAN with Linear Predictive Coding.
.- A Reinforcement Learning-Based Energy-Aware Hy brid Routing Protocol (RL-EAHR) for Enhancing Net work Lifetime, Scalability, and Resilience in Mobile Ad Hoc Networks (MANETs).
.- A Generative Method for Steganography by Cover Synthesis with Secure System.
.- Secure and Dynamic Routing in Mobile Ad-Hoc Networks through Cryptographic Assurance.
.- Optimizing IoT Networks: Insights from Compara tive Analysis in Terrestrial and Underwater Acoustic En vironments.
.- Enhancing Privacy and Security in Blockchain-Driven NFT Marketplaces Using Zero Knowledge Proof.
.- DeepXDetect: Real-Time Sandbox Malware Detection with Explainable AI.
.- Optimizing Base Station Placement to Minimize Interference for Satellite Terrestrial Networks (STN).
.- Grouped Photon Quantum Key Distribution: An Improvised BB84 Protocol.
.- Optimized Multi-Process Computing for Efficient Multimodal Biometric Security System.
.- Design, Implementation and Verification of UART with APB Slave Interface using Verilog.
.- An adaptive promiscuous mode-oriented watchdog mechanism with a route rater for secure and reliable route identification in VANETs.
.- Development and UVM-Based Functional Verification of a Scalable & Configurable UART VIP.
.- Design and Verification of a Modified Numerically Controlled Oscillator for Clock Recovery in a Digital SerDes Receiver on an FPGA.
.- Computing Science.
.- Behavioral Biometrics: A Comparison of Keystroke Dynamics and Mouse Trajectories for Bot Detection.
.- A Chaos-Based Technique with Reversible Data Hiding for Enhanced Security of Medical Data.
.- Quantum-Resistant Image Encryption Using Adaptive Signal Transform and Generative Learning.
.- An Exhaustive Analysis of Machine Learning and Deep Learning for Credit Card Fraud Detection: Methodologies, Performance, and Challenges.
.- Real-time Path Deviation Detection System Using Blockchain Technology for Mission Critical Applications.
.- Secure Post-Quantum Authentication for Wearable Healthcare Devices.
.- Optimizing GIF Steganography with Deep Learning for Superior Image Concealment.
.- Deep Learning-Enhanced Boosting-Based Ensemble Model for Phishing Detection.
.- Securing Collaboration: Federated Learning with Homomorphic Encryption.
.- Decentralized Identity Federation Using Blockchain for Cross-Organizational Access.
.- Dynamic GCN-TCN-CapsNet: A Lightweight Hybrid Model for Real-Time Gait Recognition.
.- Smart Lab Optimization using Digital Twins and Ubiquitous Computing.