Applications and Techniques in Information Security : 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers (Communications in Computer and Information Science)

個数:

Applications and Techniques in Information Security : 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 270 p.
  • 言語 ENG
  • 商品コード 9789819922635

Full Description

​This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30-31, 2022.
The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.

Contents

Privacy and Security.- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection.- Non-malleable Codes from Authenticated Encryption in Split-State Model.- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model.- Deep Learning based Differential Classifier of PRIDE and RC5.- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack.- Variants of Crypto-Jacking Attacks and their detection techniques.- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms.- Modified Blowfish Encryption Algorithm for Wireless Body Area Network.- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation.- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users.- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security.- Intrusion Detection Using Federated Learning.- Advances in Machine Learning.- A Comparative Analysis of Classification Algorithms used for predicting Parkinson's Disease.- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN.- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index.- Detection of Android Ransomware using Machine Learning Approach.- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms.- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models.- Cloud, IoT and Computing Technologies.- Analysis and Comparison of Different Frontend Frameworks.- Lightweight Capability-Based Access control for Internet of Things (IoT).- Securing IoT using blockchain.- Vikas: A Multimodal framework to Aid in Effective Disaster Management.- Discovery ofRare Itemsets using Hyper-Linked Data Structure: A Parallel Approach.

最近チェックした商品