Computational Intelligence, Cyber Security and Computational Models. Emerging Trends in Computational Models, Intelligence and Security Systems
Computational Intelligence, Cyber Security and Computational Models. Emerging Trends in Computational Models, Intelligence and Security Systems
6th International Conference, ICC3 2023, Coimbatore, India, December 14-16, 2023, Revised Selected Papers
R, Latha; U K, Sridevi; M, Thilaga; Sheen, Shina; P, Thanalakshmi
Springer International Publishing AG
04/2025
153
Mole
9783031882968
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- Deep Learning in Stock Market Forecasting: A Comparative Study.
.- Enhancing Resolution: Harnessing Generative Adversarial Networks for Domain-Specific Super- Resolution.
.- Audio Tagging - Deep Learning Approach.
.- A Design Pattern based Forecasting Model for Predicting Time Series data in Kaggle Ecosystem.
.- Cyber Security.
.- An Anonymous and Unlinkable Security Protocol for the Communication in Cloud-enabled Smart Agriculture Environment.
.- Mitigating Malware Threats in Wireless Sensor Networks: A Fractional Approach with Infected Mutant and Traced Nodes.
.- Exploring Post-Quantum Hash-Based Signature Schemes for IoT motes.
.- Computational Models.
.- Describing Regular closure of linear languages by semi-conditional insertion-deletion systems.
.- Predicting the Toxicity of Biomolecules using Graph Kernel.
.- A New Modified Juchez Distribution: Induced Juchez Distribution with its Properties and Application in Intelligent Irrigation System Data.
.- Deep Learning in Stock Market Forecasting: A Comparative Study.
.- Enhancing Resolution: Harnessing Generative Adversarial Networks for Domain-Specific Super- Resolution.
.- Audio Tagging - Deep Learning Approach.
.- A Design Pattern based Forecasting Model for Predicting Time Series data in Kaggle Ecosystem.
.- Cyber Security.
.- An Anonymous and Unlinkable Security Protocol for the Communication in Cloud-enabled Smart Agriculture Environment.
.- Mitigating Malware Threats in Wireless Sensor Networks: A Fractional Approach with Infected Mutant and Traced Nodes.
.- Exploring Post-Quantum Hash-Based Signature Schemes for IoT motes.
.- Computational Models.
.- Describing Regular closure of linear languages by semi-conditional insertion-deletion systems.
.- Predicting the Toxicity of Biomolecules using Graph Kernel.
.- A New Modified Juchez Distribution: Induced Juchez Distribution with its Properties and Application in Intelligent Irrigation System Data.