標(biāo)題: Titlebook: Cyber Security and Digital Forensics; Proceedings of ICCSD Kavita Khanna,Vania Vieira Estrela,Joel José Puga Conference proceedings 2022 T [打印本頁] 作者: 指責(zé) 時間: 2025-3-21 17:54
書目名稱Cyber Security and Digital Forensics影響因子(影響力)
書目名稱Cyber Security and Digital Forensics影響因子(影響力)學(xué)科排名
書目名稱Cyber Security and Digital Forensics網(wǎng)絡(luò)公開度
書目名稱Cyber Security and Digital Forensics網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cyber Security and Digital Forensics被引頻次
書目名稱Cyber Security and Digital Forensics被引頻次學(xué)科排名
書目名稱Cyber Security and Digital Forensics年度引用
書目名稱Cyber Security and Digital Forensics年度引用學(xué)科排名
書目名稱Cyber Security and Digital Forensics讀者反饋
書目名稱Cyber Security and Digital Forensics讀者反饋學(xué)科排名
作者: 刺穿 時間: 2025-3-21 23:42
Android Malware Detection Using Extreme Learning Machine Optimized with Swarm Intelligencethe classifier’s accuracy. The dataset consists of 1700 benign and 418 malicious Android applications from which over 15,000 features of different types were extracted, and feature selection techniques were applied. The aforementioned dataset was used to experiment our proposed model, and significan作者: 放逐 時間: 2025-3-22 04:07 作者: PAD416 時間: 2025-3-22 06:59 作者: 夸張 時間: 2025-3-22 09:42 作者: 脫毛 時間: 2025-3-22 16:26
Passive Video Forgery Detection Techniques to Detect Copy Move Tampering Through Feature Comparison ith the assistance of extricated highlights to check the measure of changes in the tempered frames all through the video stream. To check the uprightness of a video, include correlation and RANSAC strategies are utilized and it shows huge outcomes distinctive when checked with the video which altere作者: 脫毛 時間: 2025-3-22 20:17
https://doi.org/10.1057/9780230607132ribe how fog can be used in e-Healthcare systems. In this research paper, we discuss fog computing in the context of Uttarakhand. Our main concerns are security issues and challenges faced by fog computing while using the E-Healthcare system in hilly areas of Uttarakhand. In studying those challenge作者: Fecundity 時間: 2025-3-23 00:59 作者: 滔滔不絕的人 時間: 2025-3-23 03:37
Seaweeds, seagrasses, and emergent plantsrotect network against blackhole attack. These set of rules are created using three AODV critical attribute which are rate of ., . and . value. The proposed FIDS, thereafter, evaluated using ns2 simulator and are found efficient to detect and isolate the attacker node from the network. The deploymen作者: Outmoded 時間: 2025-3-23 06:36
https://doi.org/10.1007/978-3-0348-7531-8gging, C4.5 (J48) and random forest classifiers are tested on the phishing dataset. The dataset is taken from UCI repository which has 1353 instances. The C4.5 classification model has the highest accuracy rate of 90.8%.作者: Optimum 時間: 2025-3-23 10:40 作者: fiscal 時間: 2025-3-23 14:24
Roman S. Czarny,Krzysztof Kubiakith the assistance of extricated highlights to check the measure of changes in the tempered frames all through the video stream. To check the uprightness of a video, include correlation and RANSAC strategies are utilized and it shows huge outcomes distinctive when checked with the video which altere作者: 猛烈責(zé)罵 時間: 2025-3-23 18:41 作者: 虛度 時間: 2025-3-23 23:20
2367-4512 ngs current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime..978-981-16-3960-9978-981-16-3961-6Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: Hay-Fever 時間: 2025-3-24 02:39 作者: pester 時間: 2025-3-24 08:29 作者: CLIFF 時間: 2025-3-24 14:39 作者: TEN 時間: 2025-3-24 16:24 作者: Generic-Drug 時間: 2025-3-24 20:57 作者: Cupidity 時間: 2025-3-25 02:44
Authentication of Digital Media Using Reversible Watermarkinguthentication, and the creator/owner of the digital data can claim the rights, in case of any dispute. The reversible digital watermarking ensures the reusability of the cover media. In this research paper, we are suggesting a more robust method of watermarking using the combination of LWT-SVD. The 作者: creditor 時間: 2025-3-25 07:04
Automatic Test Case Generation and Fault-Tolerant Framework Based on N-version and Recovery Block Me software fails to give the result. System failure occurs when the fault in system is not revealed and corrected in time. Software fault tolerance is the major research area in software development industry. Software fault tolerance enables a system to operate efficiently if any fault exists in the 作者: 作繭自縛 時間: 2025-3-25 08:16
Chatbot to Map Medical Prognosis and Symptoms Using Machine Learningck in people’s eye and widely used among them. Gone are the occasions when the products were utilized for complex count issues or graphical portrayal alone. And Chatbots are proven revolutionary in our day-to-day lives where they are present in health, career, insurance and customer care support. In作者: 牛馬之尿 時間: 2025-3-25 13:43
Cloud Security: The Future of Data Storagehefts. It has become easier for intruders to break into the organization’s data stored locally. As cloud provides a significant hike in security levels, it is slowly turning into the future of data storage. It has become crucial to acknowledge the issues regarding cloud security. Cloud security is t作者: engagement 時間: 2025-3-25 17:08 作者: STIT 時間: 2025-3-26 00:02
Designing of Fuzzy Logic-Based Intrusion Detection System (FIDS) for Detection of Blackhole Attack iathan and Redi in IEEE Commun Magaz 40(5) 2002). It is a challenge to have efficient intrusion detection system (IDS) for such wireless and mobile architecture of systems. Researchers have presented in their research that the fuzzy logic-based intrusion detection systems are more adoptable to MANET’作者: 主動 時間: 2025-3-26 02:02
Detection of Phishing Websites Using Classification Algorithms phishing links and advertisements which may transmit malwares and viruses. Not only individual users are affected by such fraudsters but also several organizations and corporate those depend on internet for services and sales. Such malicious users adopt social engineering skills such as sending ema作者: Immunoglobulin 時間: 2025-3-26 07:07
IoT-Based Smart Security System for Agriculture Fieldske hail or frost. However, they face another important challenge of protecting crops from wild animals that may cause severe damage to their grown crops by feeding on plant parts or trampling over the crops. As most of farmers stay away from their fields, continuous monitoring of fields is not possi作者: 享樂主義者 時間: 2025-3-26 09:57
Efficient Clustering of Transactional Data for Privacy-Preserving Data Publishingion from the data. The data contain some sensitive information about the individual, and if leaked, then it will cause serious implications to the privacy of an individual. Therefore, it is required to protect the user’s privacy on the published data while ensuring the data should remain useful for 作者: indenture 時間: 2025-3-26 13:36 作者: admission 時間: 2025-3-26 19:52 作者: 音樂學(xué)者 時間: 2025-3-27 00:00
Problems of Providing Access to a Geographic Information System Processing Data of Different Degreesprocessed in real time and booked in several hundred layers. On the other hand, geographic information systems are integrated into almost all existing information systems and tend to evolve into spatial data infrastructure. This circumstance imposes strict requirements on ensuring the integrity, con作者: gospel 時間: 2025-3-27 03:22 作者: NAUT 時間: 2025-3-27 05:48 作者: Prognosis 時間: 2025-3-27 11:58
Kavita Khanna,Vania Vieira Estrela,Joel José Puga Presents research works in the field of cyber security and digital forensics.Provides original works presented at ICCSDF 2021 held in Haryana, India.Serves as a reference for researchers and practitio作者: 和平主義者 時間: 2025-3-27 13:38
Lecture Notes on Data Engineering and Communications Technologieshttp://image.papertrans.cn/d/image/241759.jpg作者: Compassionate 時間: 2025-3-27 19:52 作者: Gene408 時間: 2025-3-28 01:35
https://doi.org/10.1057/9780230607132ystems. So our fundamental concern is to identify and anticipate a malware assault on the system. As the polymorphic worm postures, an enormous challenge to identify as they have more than one occurrence and exceptionally expansive endeavors is required to detain every occurrence and to generate sig作者: 漂亮才會豪華 時間: 2025-3-28 04:54 作者: 攤位 時間: 2025-3-28 08:41
https://doi.org/10.1057/9780230607132urity measures. Most classifiers are programmed to use a training process to learn from the data itself, since full expert insight to evaluate classifier parameters is difficult or impossible. This paper proposes a methodology which is a hybrid of machine learning and swarm intelligence. This method作者: TRAWL 時間: 2025-3-28 14:19 作者: OFF 時間: 2025-3-28 16:34 作者: Adj異類的 時間: 2025-3-28 21:49
https://doi.org/10.1007/978-3-0348-7531-8 software fails to give the result. System failure occurs when the fault in system is not revealed and corrected in time. Software fault tolerance is the major research area in software development industry. Software fault tolerance enables a system to operate efficiently if any fault exists in the 作者: EVEN 時間: 2025-3-29 02:43 作者: 阻塞 時間: 2025-3-29 04:01
Seaweeds, seagrasses, and emergent plantshefts. It has become easier for intruders to break into the organization’s data stored locally. As cloud provides a significant hike in security levels, it is slowly turning into the future of data storage. It has become crucial to acknowledge the issues regarding cloud security. Cloud security is t作者: LUDE 時間: 2025-3-29 09:00
Seaweeds, seagrasses, and emergent plantsd. A lot of Nigerian citizens have in one way or the other fallen prey to this crime through online fraud, hacking into the person’s account, retrieving vital information, and the likes. It is, therefore, necessary to detect some of these crimes, reveal them, and proffer possible solutions on how to作者: Retrieval 時間: 2025-3-29 14:36 作者: 處理 時間: 2025-3-29 19:19 作者: CURT 時間: 2025-3-29 22:50 作者: excrete 時間: 2025-3-29 23:58 作者: ALIEN 時間: 2025-3-30 05:03 作者: synovial-joint 時間: 2025-3-30 10:01 作者: abolish 時間: 2025-3-30 14:13
European Union’s Strategic Autonomyprocessed in real time and booked in several hundred layers. On the other hand, geographic information systems are integrated into almost all existing information systems and tend to evolve into spatial data infrastructure. This circumstance imposes strict requirements on ensuring the integrity, con作者: COLIC 時間: 2025-3-30 20:30 作者: 消耗 時間: 2025-3-30 21:09
https://doi.org/10.1007/978-981-16-3961-6Information Security; Cryptography; Cyber Security; Digital Forensics; Network Security; Web and Applicat作者: 傲慢物 時間: 2025-3-31 03:25 作者: 縫紉 時間: 2025-3-31 05:24 作者: 植物群 時間: 2025-3-31 10:18 作者: MAPLE 時間: 2025-3-31 17:08 作者: 細(xì)胞 時間: 2025-3-31 20:01
Problems of Providing Access to a Geographic Information System Processing Data of Different Degreesfidentiality, and availability of data, makes it extremely difficult to make a decision on granting access of subjects to data, on the allocation of appropriate access rights. The article analyzes the problems of providing access to geographic information systems and suggests approaches to their solution.作者: impaction 時間: 2025-3-31 22:56
Evaluation and Performance Analysis of Apache Pulsar and NATSrokers used in the cloud: Apache Pulsar and NATS, studying qualitative differences like broker distribution, client architecture, messaging features, etc., and benchmark the two message brokers in realistic deployments.作者: Autobiography 時間: 2025-4-1 02:51
https://doi.org/10.1057/9780230607132natures. This work proposes malicious attack detection and prevention using honeypot technology. We have proposed a double-honeynet framework, which can distinguish and avoid modern worms. We apply system call analysis to detect malware which mostly focuses on the polymorphic and metamorphic virus rather than utilizing a signature-based approach.作者: 債務(wù) 時間: 2025-4-1 08:11