Cryptology and Network Security with Machine Learning : Proceedings of ICCNSML 2023 — 1st ed. 2024. (English)
- New search for: Chaturvedi, Atul
- New search for: Hasan, Sartaj Ul
- New search for: Roy, Bimal Kumar
- New search for: Tsaban, Boaz
2024
-
ISBN:
- Book / Electronic Resource
-
Title:Cryptology and Network Security with Machine Learning : Proceedings of ICCNSML 2023
-
Contributors:Chaturvedi, Atul ( editor ) / Hasan, Sartaj Ul ( editor ) / Roy, Bimal Kumar ( editor ) / Tsaban, Boaz ( editor )
-
Published in:
-
Edition:1st ed. 2024.
-
Publisher:
- New search for: Springer Nature Singapore
-
Place of publication:Singapore
-
Publication date:2024
-
Size:1 Online-Ressource(XXII, 885 p. 285 illus., 226 illus. in color.)
-
ISBN:
-
DOI:
-
Type of media:Book
-
Type of material:Electronic Resource
-
Language:English
- New search for: 621.382
- Further information on Dewey Decimal Classification
-
Keywords:
-
Classification:
DDC: 621.382 -
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Optimization of Network Mapping for Screening and Intrusion Sensing DevicesAtri, Haritima / Sharma, Amisha / Mehrotra, Tushar / Saxena, Sandeep et al. | 2024
- 2
-
Blockchain Technology in Health-Care Sector: A ReviewTiwari, Ashutosh / Kumar, Satyam / Mehrotra, Tushar / Saxena, Sandeep et al. | 2024
- 3
-
Video Steganography Techniques: A Comprehensive Review and Performance EvaluationKumar, Hemant / Mamoria, Pushpa / Kumari, Shivani / Misra, Manoj Kumar et al. | 2024
- 4
-
Real-Time Authenticated and Secure Monitoring and Control of Low-Cost Sustainable Hydroponic System in CloudShukla, Anju / Shukla, Varun / Kumar, Shishir / Kushwah, Virendra Singh / Malviya, Smarika et al. | 2024
- 5
-
Secure Design and Implementation of Smart Traffic Light Management SystemShukla, Anju / Shukla, Varun / Kumar, Shishir / Anand, Akshat et al. | 2024
- 6
-
Investigation of Sinkhole Attacks and Network Simulation on 6LoWPANSingh, Shreya / Gupta, Megha / Sharma, Deepak Kumar et al. | 2024
- 7
-
A Note on 5G Networks: Security Issues, Challenges and Connectivity ApproachesShukla, Varun / Kushwaha, Mrinal / Sharma, Risabh / Joshi, Hem Dutt et al. | 2024
- 8
-
Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature SelectionRajput, Deeksha / Sharma, Deepak Kumar / Gupta, Megha et al. | 2024
- 9
-
Hybrid Encryption Technique for Securing Cloud DataJoshi, Mamta / Priya, Rashmi / Joshi, Mukesh et al. | 2024
- 10
-
A Comprehensive Review on Transforming Security and Privacy with NLPGarg, Rachit / Gupta, Anshul / Srivastava, Atul et al. | 2024
- 11
-
Multimodal Attention CNN for Human Emotion RecognitionTiwary, Gyanendra / Chauhan, Shivani / Goyal, Krishan Kumar et al. | 2024
- 12
-
Supervised Learning Approaches for Deceit Identification: Exploring EEG as a Non-invasive TechniqueSharma, Subhag / Gupta, Manoj Kumar et al. | 2024
- 13
-
A Novel Technique to Secure Telemedicine Using Blockchain and Visual CryptographyMittal, Poonam / Vashista, Hariom / Srivastava, Atul et al. | 2024
- 14
-
Blockchain-Based Cryptocurrency Payment System Model for Business-To-Consumer E-Commerce PlatformsPal, Prashnatita / Sahana, Bikash Chandra / Poray, Jayanta / Bhattacharya, Rituparna et al. | 2024
- 15
-
Sensor Node Design Optimization Methods for Enhanced Energy Efficiency in Wireless Sensor NetworksChoudhary, Arpita / Barwar, N.C et al. | 2024
- 16
-
On Assessment of Risk Factors for Cardiovascular Disease Complexities Utilizing q-Rung Picture Fuzzy Multi-criteria Decision-Making ApproachDhumras, Himanshu / Bajaj, Rakesh Kumar / Garg, Gaurav et al. | 2024
- 17
-
Correctness Proof of the Verification of ‘A Combined Public Key Scheme in the Case of Attribute-Based for Wireless Body Area Networks’Goel, Shivani / Gupta, M. K. / Kumari, Saru et al. | 2024
- 18
-
Congestion Management Techniques in WSNs: A Comparative StudyKumar, Ajai / Lobiyal, D. K. et al. | 2024
- 19
-
Enhancing Privacy in VANET Through Attribute-Based Encryption and Blockchain Integration: Uncovering the Benefits and ChallengesVerma, Vandani / Chinmay et al. | 2024
- 20
-
IoT-Based Face Mask and Temperature Detection Using ArduinoShukla, Varun / Gupta, Sakshi / Joshi, Hem Dutt et al. | 2024
- 21
-
A Secure RSA-Based Image Encryption MethodShukla, Varun / Tiwari, Sumiti Narayan / Al-Shareeda, Mahmood A. / Dixit, Shivani et al. | 2024
- 22
-
Enhancing FHE Over the Integers: Beyond Binary Numbers and Batch ProcessingUpadhyay, Rohitkumar R. / Padhye, Sahadeo et al. | 2024
- 23
-
A Study on Designated Verifier Signature Schemes and Their VariantsVerma, Vandani / Chugh, Nitya et al. | 2024
- 24
-
An Exploration of Machine Learning Approaches in the Field of CybersecurityKhare, Brajesh Kumar / Khan, Imran et al. | 2024
- 25
-
On Complex Picture Hesitant Fuzzy Set and Its Application in Classification ProblemPoonia, Mahima / Bajaj, Rakesh Kumar / Shukla, Varun et al. | 2024
- 26
-
Enabling Credential Immutability of Academic Documents Using BlockchainPandey, Rajiv / Singh, Guru Dev / Maurya, Pratibha et al. | 2024
- 27
-
Challenges, Attacks, and Countermeasures for Security in MANETs-IoTPriyam, Anuja / Yadav, Anita et al. | 2024
- 28
-
A Review of Blockchain in Internet of Medical ThingsMansouri, Houssem / Hireche, Rachida / Benrebbouh, Chahrazed / Pathan, Al-Sakib Khan et al. | 2024
- 29
-
Demonstration of MITM Attack in Synchrophasor Network Using MAC SpoofingTiwari, Amit / Verma, Shivam / Shukla, Varun et al. | 2024
- 31
-
Blockchain Application in Real Estate in IndiaBose, Malobika / Khalid, Sheeba / Yadav, Aradhana et al. | 2024
- 32
-
A Fast and Secure Image Cryptosystem Based on New Row_Column Index Manipulator and Split_Join AlgorithmPodder, Durgabati / Deb, Subhrajyoti et al. | 2024
- 33
-
Quantum-Safe Encryption Schemes Based on Hadamard CodeRai, Pradeep / Singh, Bhupendra / Gupta, Ashok Ji et al. | 2024
- 34
-
Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block CipherSajwan, Ayan / Mishra, Girish et al. | 2024
- 35
-
Analyzing and Enhancing a User Authentication Scheme for Ad Hoc Wireless Sensor NetworksKumari, Saru / Tyagi, Pooja et al. | 2024
- 36
-
Analysis of Futuristic Currency: Facebook’s LibraSingh, Arun Kumar / Saxena, Sandeep / Shukla, Varun et al. | 2024
- 37
-
Detecting AI-Generated Deep Fakes Using ResNext CNN and LSTM-Based RNN: A Robust Approach for Real-Time Video Manipulation DetectionDhar, Akanksha / Agrawal, Ekansh et al. | 2024
- 38
-
Analysis of Security Aspect in Cloud Implementation: A Case Study of Google Cloud ProviderShrivastava, Somesh / Soni, Manish Kumar / Pratap, Ajay et al. | 2024
- 39
-
Towards Intelligent Attendance Monitoring for Scalable Organization with Hybrid Model Using Deep LearningSrivastava, Akhilesh Kumar / Mishra, Chandrahas / Mishra, Anurag / Srivastava, Atul et al. | 2024
- 40
-
NTPhish: A CNN-RNN Hybrid Deep Learning Model to Detect Phishing WebsitesKunndra, Chetanya / Choudhary, Arjun / Kaur, Jaspreet / Jogia, Aryan / Mathur, Prashant / Shukla, Varun et al. | 2024
- 41
-
Advancing Network Anomaly Detection: Comparative Analysis of Machine Learning ModelsPandey, Rashmikiran / Pandey, Mrinal / Nazarov, Alexey et al. | 2024
- 42
-
A Real-Time IoT-Enabled Biometric Attendance SystemTripathi, Ashish / Choudhary, Arjun / Srivastava, Arun Kumar / Kharbas, Vikash Kumar / Shukla, Varun et al. | 2024
- 43
-
Secure Text Transfer Using Diffie–Hellman Key Exchange Algorithm in Cloud EnvironmentPrakash, Vijay / Goyanka, Tanishka / Sharma, Shivi / Garg, Lalit / Shukla, Varun et al. | 2024
- 44
-
Web Application Authentication Using Google OAuth, Express, and MongoDBPrakash, Vijay / Dua, Kirtan / Garg, Lalit / Shukla, Varun et al. | 2024
- 45
-
Ethical Considerations and Legal Frameworks for Biometric Surveillance Systems: The Intersection of AI, Soft Biometrics, and Human SurveillancePunia, Meenakshi / Choudhary, Arjun / Agarwal, Sonu / Shukla, Varun et al. | 2024
- 46
-
Setting up an OpenVPN Server on the Google Cloud PlatformPrakash, Vijay / Jain, Chirag / Rathi, Raghav / Garg, Lalit / Shukla, Varun et al. | 2024
- 47
-
Secured Identity and Access Management for Cloud Computing Using Zero Trust ArchitectureYadav, Vinay / Soni, Manish Kumar / Pratap, Ajay et al. | 2024
- 48
-
Comments on “A Certificateless Aggregated Signcryption Scheme for Cloud-Fog Centric Industry 4.0”Verma, Girraj Kumar / Mishra, Dheerendra et al. | 2024
- 49
-
Leveraging Innovative Technologies for Ransomware Prevention in Healthcare: A Case Study of AIIMS and BeyondDubey, Ateen / Tiwari, Geetika / Dixit, Anshika / Mishra, Ananya / Pandey, Mohit et al. | 2024
- 50
-
Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoTMishra, Renu / Saxena, Sandeep / Singh, Arun Kumar / Shukla, Varun et al. | 2024
- 51
-
LSTM-Based Cryptanalysis of Stream Cipher EspressoAkhilesh / Singh, Himanshu / Mishra, Girish et al. | 2024
- 52
-
Study of Energy-Efficient Virtual Machine Migration with Assurance of Service-Level AgreementsPanwar, Suraj Singh / Rauthan, M. M. S. / Barthwal, Varun / Gaur, Sachin / Mehra, Nidhi et al. | 2024
- 53
-
A Novel Security Model for Healthcare Prediction by Using DLDhoot, Anshita / Deva, Rahul / Shukla, Varun et al. | 2024
- 54
-
Residual Learning and Deep Learning Models for Image Denoising in Medical ApplicationsSrivastava, Atul / Rana, Harshita / Misra, Manoj Kumar / Singh, Youddha Beer et al. | 2024
- 55
-
Legal Status of Crypto-Assets in India Through the Constitutional LensYadav, Aradhana / Yadav, Pooja et al. | 2024
- 56
-
Deep Learning Models for Stock Market Forecasting: GARCH, ARIMA, CNN, LSTM, RNNSrivastava, Atul / Srivastava, Aditya / Singh, Youddha Beer / Misra, Manoj Kumar et al. | 2024
- 57
-
Investigating Optimization Methods in Computer Science Engineering: A Comprehensive StudyKumar, Yash / Dixit, Prashant / Srivastava, Atul / Sahoo, Ramesh et al. | 2024
- 58
-
Privacy and Security of Bio-inspired Computing of Diabetic Retinopathy Detection Using Machine LearningKumar, Manoj / Kumar, Atulya Kashish / Bhargava, Mimansa / Singh, Rudra Pratap / Shukla, Anju / Shukla, Varun et al. | 2024
- 59
-
Key Agreement Using Symmetric GroupBajpai, Prakersh / Misra, Manoj Kumar / Mishra, Prashant Kumar / Singh, Shailendra et al. | 2024