Cyber Security and Digital Forensics : Select Proceedings of the International Conference, ReDCySec 2023 (Lecture Notes in Networks and Systems)

個数:

Cyber Security and Digital Forensics : Select Proceedings of the International Conference, ReDCySec 2023 (Lecture Notes in Networks and Systems)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9789819998104

Full Description

The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry.

Contents

A Modest Approach Toward Cloud Security Hygiene.- A Survey on Path Key Establishment.- Credit Card Fraud Detection using ML Techniques.- Vulnerabilities in Smart contracts of Decentralized Blockchain.- Object Detection using TensorFlow 2 and Amazon Sage Maker.- Multi-Key Fully Homomorphic Encryption Scheme Over Integers.- Hybrid Lightweight Cryptography using AES and ECC for IoT Security.- A Survey: Analysis of Existing Hybrid Cryptographic Techniques.- Cloud based Integrated Real-Time Twitter Grievance Redressal With AWS EC2 and RDS using Machine Learning Approach for Enhanced Security.- Blockchain Based Public Distribution System.- Security Flaw in TCP/IP and Proposed Measures.- Identity Based Designated Verifier Proxy Signature scheme and its Application to Health Care.- Detection of Phishing Link using different Machine Learning Techniques.- Categorizing Tracing Techniques for Network Forensics.- Cloud-Based Object Detection Model using Amazon Rekognition.- Orphanage Channelization System Using Blockchain Technology.- A Review on Quantum key Distribution Protocols, Challenges and Its Applications.- Static Analysis Approach of Malware using Machine Learning.- Chatbot based android application towards security using FCM.- Ensemble Deep Model for Hate Speech Detection.- Accuracy Enhancement For Intrusion Detection Systems Using LSTM Approach.- Cyber Attack Detection Using Machine Learning Technique.- An Investigative study on Security Aspects and Authentication Schemes for Internet of Vehicles.

最近チェックした商品