Advances in Cyber Security and Intelligent Analytics
portes grátis
Advances in Cyber Security and Intelligent Analytics
Verma, Abhishek; Singh, Vrijendra; Balas, Valentina Emilia; Kumar, Jitendra; Gaur, Hari Mohan
Taylor & Francis Ltd
10/2024
292
Mole
9781032216010
15 a 20 dias
Descrição não disponível.
1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends
KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA
2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN
3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework
D. SANTHADEVI AND B. JANET
4 Exploring the possibility of blockchain and smart contract-based digital certificate
P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range
NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH
6 Addressing the cybersecurity issues in cloud computing
SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD
7 Role of medical image encryption algorithms in cloud platform for teleradiology applications
SIJU JOHN AND S. N. KUMAR
8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things
THULASI M. SANTHI AND M. C. HELEN MARY
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues
ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA
10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents
MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID
11 A detailed cram on artificial intelligence industrial systems 4.0
P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI
12 Ensuring liveliness property in safety-critical systems
ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR
13 Machine learning for intelligent analytics
JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL
14 Secure 3D route optimization of combat vehicles in war field using IoV
ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA
15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis
B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH
16 Containerization in cloud computing for OS-level virtualization
MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK
17 An adaptive deep learning approach for stock price forecasting
RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA
KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA
2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN
3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework
D. SANTHADEVI AND B. JANET
4 Exploring the possibility of blockchain and smart contract-based digital certificate
P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range
NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH
6 Addressing the cybersecurity issues in cloud computing
SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD
7 Role of medical image encryption algorithms in cloud platform for teleradiology applications
SIJU JOHN AND S. N. KUMAR
8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things
THULASI M. SANTHI AND M. C. HELEN MARY
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues
ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA
10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents
MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID
11 A detailed cram on artificial intelligence industrial systems 4.0
P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI
12 Ensuring liveliness property in safety-critical systems
ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR
13 Machine learning for intelligent analytics
JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL
14 Secure 3D route optimization of combat vehicles in war field using IoV
ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA
15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis
B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH
16 Containerization in cloud computing for OS-level virtualization
MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK
17 An adaptive deep learning approach for stock price forecasting
RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cyber security and intelligent analytics;Secure Information-Centric Networking;Blockchain and Smart Contract based Digital Certificate;Cyber Risk Quantification;medical IoT;Deep Learning;Packet Filtering;Unsupervised Machine Learning;Agricultural Drones;Cyber Threat Intelligence;VANET;IoT Device;Fog Computing;Cloud Computing;Edge Computing;Cyber Physical Systems;VMs;Attack Graph;TLS Protocol;PN;Smart Contract;Cyber Risk;Henon Map;IoT Network;Chaotic Maps;Diamond Crossing;Docker Container;Cloud Service Providers;Smart Phone;End Entity
1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends
KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA
2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN
3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework
D. SANTHADEVI AND B. JANET
4 Exploring the possibility of blockchain and smart contract-based digital certificate
P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range
NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH
6 Addressing the cybersecurity issues in cloud computing
SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD
7 Role of medical image encryption algorithms in cloud platform for teleradiology applications
SIJU JOHN AND S. N. KUMAR
8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things
THULASI M. SANTHI AND M. C. HELEN MARY
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues
ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA
10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents
MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID
11 A detailed cram on artificial intelligence industrial systems 4.0
P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI
12 Ensuring liveliness property in safety-critical systems
ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR
13 Machine learning for intelligent analytics
JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL
14 Secure 3D route optimization of combat vehicles in war field using IoV
ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA
15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis
B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH
16 Containerization in cloud computing for OS-level virtualization
MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK
17 An adaptive deep learning approach for stock price forecasting
RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA
KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA
2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN
3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework
D. SANTHADEVI AND B. JANET
4 Exploring the possibility of blockchain and smart contract-based digital certificate
P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range
NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH
6 Addressing the cybersecurity issues in cloud computing
SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD
7 Role of medical image encryption algorithms in cloud platform for teleradiology applications
SIJU JOHN AND S. N. KUMAR
8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things
THULASI M. SANTHI AND M. C. HELEN MARY
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues
ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA
10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents
MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID
11 A detailed cram on artificial intelligence industrial systems 4.0
P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI
12 Ensuring liveliness property in safety-critical systems
ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR
13 Machine learning for intelligent analytics
JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL
14 Secure 3D route optimization of combat vehicles in war field using IoV
ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA
15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis
B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH
16 Containerization in cloud computing for OS-level virtualization
MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK
17 An adaptive deep learning approach for stock price forecasting
RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cyber security and intelligent analytics;Secure Information-Centric Networking;Blockchain and Smart Contract based Digital Certificate;Cyber Risk Quantification;medical IoT;Deep Learning;Packet Filtering;Unsupervised Machine Learning;Agricultural Drones;Cyber Threat Intelligence;VANET;IoT Device;Fog Computing;Cloud Computing;Edge Computing;Cyber Physical Systems;VMs;Attack Graph;TLS Protocol;PN;Smart Contract;Cyber Risk;Henon Map;IoT Network;Chaotic Maps;Diamond Crossing;Docker Container;Cloud Service Providers;Smart Phone;End Entity