找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cyber Security; Proceedings of CSI 2 M. U. Bokhari,Namrata Agrawal,Dharmendra Saini Conference proceedings 2018 Springer Nature Singapore P

[復(fù)制鏈接]
查看: 43528|回復(fù): 62
樓主
發(fā)表于 2025-3-21 16:12:22 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Cyber Security
副標(biāo)題Proceedings of CSI 2
編輯M. U. Bokhari,Namrata Agrawal,Dharmendra Saini
視頻videohttp://file.papertrans.cn/242/241733/241733.mp4
概述Enhances awareness about cyber security.Brings forth learnings from skilled industry experts, academicians, and researchers.Covers national and international collaborations and cooperation in cyber se
叢書名稱Advances in Intelligent Systems and Computing
圖書封面Titlebook: Cyber Security; Proceedings of CSI 2 M. U. Bokhari,Namrata Agrawal,Dharmendra Saini Conference proceedings 2018 Springer Nature Singapore P
描述This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.
出版日期Conference proceedings 2018
關(guān)鍵詞Internet Security; Phishing; CSI 2015; Digital Life; Digital Security; Cybercrime
版次1
doihttps://doi.org/10.1007/978-981-10-8536-9
isbn_softcover978-981-10-8535-2
isbn_ebook978-981-10-8536-9Series ISSN 2194-5357 Series E-ISSN 2194-5365
issn_series 2194-5357
copyrightSpringer Nature Singapore Pte Ltd. 2018
The information of publication is updating

書目名稱Cyber Security影響因子(影響力)




書目名稱Cyber Security影響因子(影響力)學(xué)科排名




書目名稱Cyber Security網(wǎng)絡(luò)公開度




書目名稱Cyber Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cyber Security被引頻次




書目名稱Cyber Security被引頻次學(xué)科排名




書目名稱Cyber Security年度引用




書目名稱Cyber Security年度引用學(xué)科排名




書目名稱Cyber Security讀者反饋




書目名稱Cyber Security讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:15:33 | 只看該作者
Modern and Contemporary Poetry and Poeticsthe network node. In our proposed algorithm, a unique and effective algorithm for location-based key generation is devised and implemented which makes use of dynamic key exchange based on the location.
板凳
發(fā)表于 2025-3-22 03:16:24 | 只看該作者
地板
發(fā)表于 2025-3-22 06:34:29 | 只看該作者
GPS Hash Table Based Location Identifier Algorithm for Security and Integrity Against Vampire Attacthe network node. In our proposed algorithm, a unique and effective algorithm for location-based key generation is devised and implemented which makes use of dynamic key exchange based on the location.
5#
發(fā)表于 2025-3-22 10:09:21 | 只看該作者
6#
發(fā)表于 2025-3-22 16:58:55 | 只看該作者
7#
發(fā)表于 2025-3-22 17:02:29 | 只看該作者
8#
發(fā)表于 2025-3-22 23:02:31 | 只看該作者
https://doi.org/10.1007/978-94-015-3452-9this, we are trying to emerge with frequent LWC algorithms which are grouped into stream cipher, block cipher, and hybrid model, and also reveal them, at the last a comparison is conducted on the effective parameters.
9#
發(fā)表于 2025-3-23 01:41:56 | 只看該作者
A Social Epistemology of Research Groups types of attacks. Thus, in this paper, we have studied the various types of IDS and their features which made them either suitable or unsuitable for cloud computing. Also on the basis of review, required features for the Cloud-based IDS are identified.
10#
發(fā)表于 2025-3-23 06:18:15 | 只看該作者
Anan Srour,Adi Mana,Shifra Sagyated using several performance metrics such as PSNR, Mean Square Error (MSE), time complexity and Mean Absolute Error (MAE) of the mechanism. The result shows that the proposed technique is far better in terms of security but with some overheads when compared to stand-alone technique DCT.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 18:07
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
远安县| 龙里县| 通许县| 华容县| 镶黄旗| 赣州市| 黑山县| 柳州市| 绥江县| 武宣县| 金塔县| 始兴县| 石棉县| 徐闻县| 南昌县| 北安市| 乌恰县| 油尖旺区| 稻城县| 洞头县| 太原市| 宣汉县| 松江区| 平塘县| 保亭| 元江| 双城市| 涟水县| 陆良县| 安徽省| 永定县| 和静县| 博湖县| 毕节市| 宽甸| 敖汉旗| 怀远县| 通化县| 慈利县| 青铜峡市| 虞城县|