Cyber Warfare, Security and Space Computing

Cyber Warfare, Security and Space Computing

Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22-23, 2024, Proceedings

Pljonkin, Anton; Joshi, Sandeep; Radenkovic, Milena; Bairwa, Amit Kumar

Springer International Publishing AG

11/2024

379

Mole

9783031734939

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Visvesvarayya Space Lab: preliminary space lab demonstrator.



.- Hybrid Deep Driven Cross Industry Sentiment Analysis Model for Netizen's Behavioral Characterization.



.- Fake Product Detection using Blockchain with Encryption and AI.



.- S-Defender: A Smishing Detection Approach in Mobile Environment.



.- Mathematical Socio Analysis of Cybercrimes Preparedness A simulation Odessey with R.



.- Revolutionizing Weather Forecasting: Harnessing Machine Learning and Big Data in Upcoming Technologies.



.- Trends in Drowsiness Detection & Analysis of the Different Technologies Engaged.



.- Detecting Local Software Issues Using NSGA Multi-Optimization.



.- Deep Learning and IoT Based Robotics to Monitor the Traffic.



.- Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain Family.



.- Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device.



.- Development of Elliptical Cryptography Technique to Watermark Embedded and extrusion for Healthcare Records.



. -Step-by-Step Image Encryption Using Uaci and Pixadpt.



.- Investigation of Post - Quantum Cryptography to Secure the Functionality of Vehicle Hardware Architecture.



.- Secure Data Management Using BlockChain.



.- Navigating through Digital Realm: Role of Cyberpsychology in Fostering Mental Well-being & Digital Empathy.



.- An Empirical Analysis of Neighborhood-based Approaches for Trustworthy Recommendations with Apache Mahout.



.- Multilingual Sentiment Analysis over Real-time Voice.



.- Identity Verification: A Decentralized KYC Approach Using Blockchain.



.- A Neural Network-based Facial Expressions Detection Technique using CK+ Dataset.



.- Cyber Security Challenges in Industrial Settings with the Internet of Things.



.- Designing Secure Software-Defined Network, Resistant to DDoS Attack Using Non-Linear Routing Rule Installation.



.- NPQuant: A Robust Quantum Inspired Computation Algorithms as an efficient solution to NP-Complete Problems.



.- Impact of Sentiment Analysis in E-Commerce and Cybersecurity.



.- Cultivating Cyber Vigilance: Shaping Employee Behavior for Security Success .



.- A Deep Learning Approach to PDF Malware Detection Enhanced with XAI.



.- Optimized Deep Learning Technique for the Effective Detection of Windows PE malware.
Software and application security;Software security engineering;Web application security;Social network security and privacy;Domain-specific security and privacy architectures;Quantum Computing