Cyber Warfare, Security and Space Computing : Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22-23, 2024, Proceedings (Communications in Computer and Information Science) (2024)

個数:

Cyber Warfare, Security and Space Computing : Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22-23, 2024, Proceedings (Communications in Computer and Information Science) (2024)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 372 p.
  • 商品コード 9783031734939

Full Description

This book constitutes selected papers from the Second International Conference on Cyber Warfare, Security and Space Research, SpacSec 2024, held in Jaipur, India, on February 22-23, 2024.

The 27 papers presented here were carefully reviewed and selected from 333 submissions. These papers focus on various domains of Cyber warfare and Space computing, including emerging research and applications in the field.

 

Contents

.- Visvesvarayya Space Lab: preliminary space lab demonstrator.

.- Hybrid Deep Driven Cross Industry Sentiment Analysis Model for Netizen's Behavioral Characterization.

.- Fake Product Detection using Blockchain with Encryption and AI.

.- S-Defender: A Smishing Detection Approach in Mobile Environment.

.- Mathematical Socio Analysis of Cybercrimes Preparedness A simulation Odessey with R.

.- Revolutionizing Weather Forecasting: Harnessing Machine Learning and Big Data in Upcoming Technologies.

.- Trends in Drowsiness Detection & Analysis of the Different Technologies Engaged.

.- Detecting Local Software Issues Using NSGA Multi-Optimization.

.- Deep Learning and IoT Based Robotics to Monitor the Traffic.

.- Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain Family.

.- Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device.

.- Development of Elliptical Cryptography Technique to Watermark Embedded and extrusion for Healthcare Records.

. -Step-by-Step Image Encryption Using Uaci and Pixadpt.

.- Investigation of Post - Quantum Cryptography to Secure the Functionality of Vehicle Hardware Architecture.

.- Secure Data Management Using BlockChain.

.- Navigating through Digital Realm: Role of Cyberpsychology in Fostering Mental Well-being & Digital Empathy.

.- An Empirical Analysis of Neighborhood-based Approaches for Trustworthy Recommendations with Apache Mahout.

.- Multilingual Sentiment Analysis over Real-time Voice.

.- Identity Verification: A Decentralized KYC Approach Using Blockchain.

.- A Neural Network-based Facial Expressions Detection Technique using CK+ Dataset.

.- Cyber Security Challenges in Industrial Settings with the Internet of Things.

.- Designing Secure Software-Defined Network, Resistant to DDoS Attack Using Non-Linear Routing Rule Installation.

.- NPQuant: A Robust Quantum Inspired Computation Algorithms as an efficient solution to NP-Complete Problems.

.- Impact of Sentiment Analysis in E-Commerce and Cybersecurity.

.- Cultivating Cyber Vigilance: Shaping Employee Behavior for Security Success .

.- A Deep Learning Approach to PDF Malware Detection Enhanced with XAI.

.- Optimized Deep Learning Technique for the Effective Detection of Windows PE malware.

最近チェックした商品