000 04843nam a22006255i 4500
001 978-981-99-2264-2
003 DE-He213
005 20240423125249.0
007 cr nn 008mamaa
008 230511s2023 si | s |||| 0|eng d
020 _a9789819922642
_9978-981-99-2264-2
024 7 _a10.1007/978-981-99-2264-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aApplications and Techniques in Information Security
_h[electronic resource] :
_b13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers /
_cedited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li.
250 _a1st ed. 2023.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2023.
300 _aXIII, 304 p. 159 illus., 120 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1804
505 0 _aPrivacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery ofRare Itemsets using Hyper-Linked Data Structure: A Parallel Approach.
520 _aThis book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30–31, 2022. The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
650 0 _aData protection.
650 0 _aArtificial intelligence.
650 0 _aComputer networks .
650 0 _aEducation
_xData processing.
650 0 _aComputer engineering.
650 1 4 _aData and Information Security.
650 2 4 _aArtificial Intelligence.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputers and Education.
650 2 4 _aComputer Engineering and Networks.
700 1 _aPrabhu, Srikanth.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPokhrel, Shiva Raj.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLi, Gang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819922635
776 0 8 _iPrinted edition:
_z9789819922659
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1804
856 4 0 _uhttps://doi.org/10.1007/978-981-99-2264-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c176041
_d176041