派博傳思國際中心

標(biāo)題: Titlebook: Cyber Security and Digital Forensics; Proceedings of ICCSD Kavita Khanna,Vania Vieira Estrela,Joel José Puga Conference proceedings 2022 T [打印本頁]

作者: 指責(zé)    時間: 2025-3-21 17:54
書目名稱Cyber Security and Digital Forensics影響因子(影響力)




書目名稱Cyber Security and Digital Forensics影響因子(影響力)學(xué)科排名




書目名稱Cyber Security and Digital Forensics網(wǎng)絡(luò)公開度




書目名稱Cyber Security and Digital Forensics網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cyber Security and Digital Forensics被引頻次




書目名稱Cyber Security and Digital Forensics被引頻次學(xué)科排名




書目名稱Cyber Security and Digital Forensics年度引用




書目名稱Cyber Security and Digital Forensics年度引用學(xué)科排名




書目名稱Cyber Security and Digital Forensics讀者反饋




書目名稱Cyber Security and Digital Forensics讀者反饋學(xué)科排名





作者: 刺穿    時間: 2025-3-21 23:42
Android Malware Detection Using Extreme Learning Machine Optimized with Swarm Intelligencethe classifier’s accuracy. The dataset consists of 1700 benign and 418 malicious Android applications from which over 15,000 features of different types were extracted, and feature selection techniques were applied. The aforementioned dataset was used to experiment our proposed model, and significan
作者: 放逐    時間: 2025-3-22 04:07

作者: PAD416    時間: 2025-3-22 06:59

作者: 夸張    時間: 2025-3-22 09:42

作者: 脫毛    時間: 2025-3-22 16:26
Passive Video Forgery Detection Techniques to Detect Copy Move Tampering Through Feature Comparison ith the assistance of extricated highlights to check the measure of changes in the tempered frames all through the video stream. To check the uprightness of a video, include correlation and RANSAC strategies are utilized and it shows huge outcomes distinctive when checked with the video which altere
作者: 脫毛    時間: 2025-3-22 20:17
https://doi.org/10.1057/9780230607132ribe how fog can be used in e-Healthcare systems. In this research paper, we discuss fog computing in the context of Uttarakhand. Our main concerns are security issues and challenges faced by fog computing while using the E-Healthcare system in hilly areas of Uttarakhand. In studying those challenge
作者: Fecundity    時間: 2025-3-23 00:59

作者: 滔滔不絕的人    時間: 2025-3-23 03:37
Seaweeds, seagrasses, and emergent plantsrotect network against blackhole attack. These set of rules are created using three AODV critical attribute which are rate of ., . and . value. The proposed FIDS, thereafter, evaluated using ns2 simulator and are found efficient to detect and isolate the attacker node from the network. The deploymen
作者: Outmoded    時間: 2025-3-23 06:36
https://doi.org/10.1007/978-3-0348-7531-8gging, C4.5 (J48) and random forest classifiers are tested on the phishing dataset. The dataset is taken from UCI repository which has 1353 instances. The C4.5 classification model has the highest accuracy rate of 90.8%.
作者: Optimum    時間: 2025-3-23 10:40

作者: fiscal    時間: 2025-3-23 14:24
Roman S. Czarny,Krzysztof Kubiakith the assistance of extricated highlights to check the measure of changes in the tempered frames all through the video stream. To check the uprightness of a video, include correlation and RANSAC strategies are utilized and it shows huge outcomes distinctive when checked with the video which altere
作者: 猛烈責(zé)罵    時間: 2025-3-23 18:41

作者: 虛度    時間: 2025-3-23 23:20
2367-4512 ngs current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime..978-981-16-3960-9978-981-16-3961-6Series ISSN 2367-4512 Series E-ISSN 2367-4520
作者: Hay-Fever    時間: 2025-3-24 02:39

作者: pester    時間: 2025-3-24 08:29

作者: CLIFF    時間: 2025-3-24 14:39

作者: TEN    時間: 2025-3-24 16:24

作者: Generic-Drug    時間: 2025-3-24 20:57

作者: Cupidity    時間: 2025-3-25 02:44
Authentication of Digital Media Using Reversible Watermarkinguthentication, and the creator/owner of the digital data can claim the rights, in case of any dispute. The reversible digital watermarking ensures the reusability of the cover media. In this research paper, we are suggesting a more robust method of watermarking using the combination of LWT-SVD. The
作者: creditor    時間: 2025-3-25 07:04
Automatic Test Case Generation and Fault-Tolerant Framework Based on N-version and Recovery Block Me software fails to give the result. System failure occurs when the fault in system is not revealed and corrected in time. Software fault tolerance is the major research area in software development industry. Software fault tolerance enables a system to operate efficiently if any fault exists in the
作者: 作繭自縛    時間: 2025-3-25 08:16
Chatbot to Map Medical Prognosis and Symptoms Using Machine Learningck in people’s eye and widely used among them. Gone are the occasions when the products were utilized for complex count issues or graphical portrayal alone. And Chatbots are proven revolutionary in our day-to-day lives where they are present in health, career, insurance and customer care support. In
作者: 牛馬之尿    時間: 2025-3-25 13:43
Cloud Security: The Future of Data Storagehefts. It has become easier for intruders to break into the organization’s data stored locally. As cloud provides a significant hike in security levels, it is slowly turning into the future of data storage. It has become crucial to acknowledge the issues regarding cloud security. Cloud security is t
作者: engagement    時間: 2025-3-25 17:08

作者: STIT    時間: 2025-3-26 00:02
Designing of Fuzzy Logic-Based Intrusion Detection System (FIDS) for Detection of Blackhole Attack iathan and Redi in IEEE Commun Magaz 40(5) 2002). It is a challenge to have efficient intrusion detection system (IDS) for such wireless and mobile architecture of systems. Researchers have presented in their research that the fuzzy logic-based intrusion detection systems are more adoptable to MANET’
作者: 主動    時間: 2025-3-26 02:02
Detection of Phishing Websites Using Classification Algorithms phishing links and advertisements which may transmit malwares and viruses. Not only individual users are affected by such fraudsters but also several organizations and corporate those depend on internet for services and sales. Such malicious users adopt social engineering skills such as sending ema
作者: Immunoglobulin    時間: 2025-3-26 07:07
IoT-Based Smart Security System for Agriculture Fieldske hail or frost. However, they face another important challenge of protecting crops from wild animals that may cause severe damage to their grown crops by feeding on plant parts or trampling over the crops. As most of farmers stay away from their fields, continuous monitoring of fields is not possi
作者: 享樂主義者    時間: 2025-3-26 09:57
Efficient Clustering of Transactional Data for Privacy-Preserving Data Publishingion from the data. The data contain some sensitive information about the individual, and if leaked, then it will cause serious implications to the privacy of an individual. Therefore, it is required to protect the user’s privacy on the published data while ensuring the data should remain useful for
作者: indenture    時間: 2025-3-26 13:36

作者: admission    時間: 2025-3-26 19:52

作者: 音樂學(xué)者    時間: 2025-3-27 00:00
Problems of Providing Access to a Geographic Information System Processing Data of Different Degreesprocessed in real time and booked in several hundred layers. On the other hand, geographic information systems are integrated into almost all existing information systems and tend to evolve into spatial data infrastructure. This circumstance imposes strict requirements on ensuring the integrity, con
作者: gospel    時間: 2025-3-27 03:22

作者: NAUT    時間: 2025-3-27 05:48

作者: Prognosis    時間: 2025-3-27 11:58
Kavita Khanna,Vania Vieira Estrela,Joel José Puga Presents research works in the field of cyber security and digital forensics.Provides original works presented at ICCSDF 2021 held in Haryana, India.Serves as a reference for researchers and practitio
作者: 和平主義者    時間: 2025-3-27 13:38
Lecture Notes on Data Engineering and Communications Technologieshttp://image.papertrans.cn/d/image/241759.jpg
作者: Compassionate    時間: 2025-3-27 19:52

作者: Gene408    時間: 2025-3-28 01:35
https://doi.org/10.1057/9780230607132ystems. So our fundamental concern is to identify and anticipate a malware assault on the system. As the polymorphic worm postures, an enormous challenge to identify as they have more than one occurrence and exceptionally expansive endeavors is required to detain every occurrence and to generate sig
作者: 漂亮才會豪華    時間: 2025-3-28 04:54

作者: 攤位    時間: 2025-3-28 08:41
https://doi.org/10.1057/9780230607132urity measures. Most classifiers are programmed to use a training process to learn from the data itself, since full expert insight to evaluate classifier parameters is difficult or impossible. This paper proposes a methodology which is a hybrid of machine learning and swarm intelligence. This method
作者: TRAWL    時間: 2025-3-28 14:19

作者: OFF    時間: 2025-3-28 16:34

作者: Adj異類的    時間: 2025-3-28 21:49
https://doi.org/10.1007/978-3-0348-7531-8 software fails to give the result. System failure occurs when the fault in system is not revealed and corrected in time. Software fault tolerance is the major research area in software development industry. Software fault tolerance enables a system to operate efficiently if any fault exists in the
作者: EVEN    時間: 2025-3-29 02:43

作者: 阻塞    時間: 2025-3-29 04:01
Seaweeds, seagrasses, and emergent plantshefts. It has become easier for intruders to break into the organization’s data stored locally. As cloud provides a significant hike in security levels, it is slowly turning into the future of data storage. It has become crucial to acknowledge the issues regarding cloud security. Cloud security is t
作者: LUDE    時間: 2025-3-29 09:00
Seaweeds, seagrasses, and emergent plantsd. A lot of Nigerian citizens have in one way or the other fallen prey to this crime through online fraud, hacking into the person’s account, retrieving vital information, and the likes. It is, therefore, necessary to detect some of these crimes, reveal them, and proffer possible solutions on how to
作者: Retrieval    時間: 2025-3-29 14:36

作者: 處理    時間: 2025-3-29 19:19

作者: CURT    時間: 2025-3-29 22:50

作者: excrete    時間: 2025-3-29 23:58

作者: ALIEN    時間: 2025-3-30 05:03

作者: synovial-joint    時間: 2025-3-30 10:01

作者: abolish    時間: 2025-3-30 14:13
European Union’s Strategic Autonomyprocessed in real time and booked in several hundred layers. On the other hand, geographic information systems are integrated into almost all existing information systems and tend to evolve into spatial data infrastructure. This circumstance imposes strict requirements on ensuring the integrity, con
作者: COLIC    時間: 2025-3-30 20:30

作者: 消耗    時間: 2025-3-30 21:09
https://doi.org/10.1007/978-981-16-3961-6Information Security; Cryptography; Cyber Security; Digital Forensics; Network Security; Web and Applicat
作者: 傲慢物    時間: 2025-3-31 03:25

作者: 縫紉    時間: 2025-3-31 05:24

作者: 植物群    時間: 2025-3-31 10:18

作者: MAPLE    時間: 2025-3-31 17:08

作者: 細(xì)胞    時間: 2025-3-31 20:01
Problems of Providing Access to a Geographic Information System Processing Data of Different Degreesfidentiality, and availability of data, makes it extremely difficult to make a decision on granting access of subjects to data, on the allocation of appropriate access rights. The article analyzes the problems of providing access to geographic information systems and suggests approaches to their solution.
作者: impaction    時間: 2025-3-31 22:56
Evaluation and Performance Analysis of Apache Pulsar and NATSrokers used in the cloud: Apache Pulsar and NATS, studying qualitative differences like broker distribution, client architecture, messaging features, etc., and benchmark the two message brokers in realistic deployments.
作者: Autobiography    時間: 2025-4-1 02:51
https://doi.org/10.1057/9780230607132natures. This work proposes malicious attack detection and prevention using honeypot technology. We have proposed a double-honeynet framework, which can distinguish and avoid modern worms. We apply system call analysis to detect malware which mostly focuses on the polymorphic and metamorphic virus rather than utilizing a signature-based approach.
作者: 債務(wù)    時間: 2025-4-1 08:11





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
绥化市| 兰州市| 监利县| 深水埗区| 泽普县| 郧西县| 喜德县| 福安市| 龙门县| 河东区| 惠安县| 大安市| 宁乡县| 丁青县| 大同县| 义乌市| 靖边县| 图片| 大同县| 永寿县| 岚皋县| 都昌县| 泰州市| 杭锦后旗| 逊克县| 九龙县| 韶山市| 丰原市| 惠来县| 神池县| 三原县| 新民市| 通许县| 贡山| 石城县| 济阳县| 自贡市| 彭泽县| 招远市| 昭平县| 杂多县|