找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber Security; Proceedings of CSI 2 M. U. Bokhari,Namrata Agrawal,Dharmendra Saini Conference proceedings 2018 Springer Nature Singapore P

[复制链接]
查看: 43481|回复: 62
发表于 2025-3-21 16:12:22 | 显示全部楼层 |阅读模式
书目名称Cyber Security
副标题Proceedings of CSI 2
编辑M. U. Bokhari,Namrata Agrawal,Dharmendra Saini
视频videohttp://file.papertrans.cn/242/241733/241733.mp4
概述Enhances awareness about cyber security.Brings forth learnings from skilled industry experts, academicians, and researchers.Covers national and international collaborations and cooperation in cyber se
丛书名称Advances in Intelligent Systems and Computing
图书封面Titlebook: Cyber Security; Proceedings of CSI 2 M. U. Bokhari,Namrata Agrawal,Dharmendra Saini Conference proceedings 2018 Springer Nature Singapore P
描述This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.
出版日期Conference proceedings 2018
关键词Internet Security; Phishing; CSI 2015; Digital Life; Digital Security; Cybercrime
版次1
doihttps://doi.org/10.1007/978-981-10-8536-9
isbn_softcover978-981-10-8535-2
isbn_ebook978-981-10-8536-9Series ISSN 2194-5357 Series E-ISSN 2194-5365
issn_series 2194-5357
copyrightSpringer Nature Singapore Pte Ltd. 2018
The information of publication is updating

书目名称Cyber Security影响因子(影响力)




书目名称Cyber Security影响因子(影响力)学科排名




书目名称Cyber Security网络公开度




书目名称Cyber Security网络公开度学科排名




书目名称Cyber Security被引频次




书目名称Cyber Security被引频次学科排名




书目名称Cyber Security年度引用




书目名称Cyber Security年度引用学科排名




书目名称Cyber Security读者反馈




书目名称Cyber Security读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:15:33 | 显示全部楼层
Modern and Contemporary Poetry and Poeticsthe network node. In our proposed algorithm, a unique and effective algorithm for location-based key generation is devised and implemented which makes use of dynamic key exchange based on the location.
发表于 2025-3-22 03:16:24 | 显示全部楼层
发表于 2025-3-22 06:34:29 | 显示全部楼层
GPS Hash Table Based Location Identifier Algorithm for Security and Integrity Against Vampire Attacthe network node. In our proposed algorithm, a unique and effective algorithm for location-based key generation is devised and implemented which makes use of dynamic key exchange based on the location.
发表于 2025-3-22 10:09:21 | 显示全部楼层
发表于 2025-3-22 16:58:55 | 显示全部楼层
发表于 2025-3-22 17:02:29 | 显示全部楼层
发表于 2025-3-22 23:02:31 | 显示全部楼层
https://doi.org/10.1007/978-94-015-3452-9this, we are trying to emerge with frequent LWC algorithms which are grouped into stream cipher, block cipher, and hybrid model, and also reveal them, at the last a comparison is conducted on the effective parameters.
发表于 2025-3-23 01:41:56 | 显示全部楼层
A Social Epistemology of Research Groups types of attacks. Thus, in this paper, we have studied the various types of IDS and their features which made them either suitable or unsuitable for cloud computing. Also on the basis of review, required features for the Cloud-based IDS are identified.
发表于 2025-3-23 06:18:15 | 显示全部楼层
Anan Srour,Adi Mana,Shifra Sagyated using several performance metrics such as PSNR, Mean Square Error (MSE), time complexity and Mean Absolute Error (MAE) of the mechanism. The result shows that the proposed technique is far better in terms of security but with some overheads when compared to stand-alone technique DCT.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-16 00:03
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表