Cyber Warfare, Security and Space Computing
Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22¿23, 2024, Proceedings
Herausgegeben:Joshi, Sandeep; Bairwa, Amit Kumar; Radenkovic, Milena; Pljonkin, Anton
Cyber Warfare, Security and Space Computing
Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22¿23, 2024, Proceedings
Herausgegeben:Joshi, Sandeep; Bairwa, Amit Kumar; Radenkovic, Milena; Pljonkin, Anton
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes selected papers from the Second International Conference on Cyber Warfare, Security and Space Research, SpacSec 2024, held in Jaipur, India, on February 22-23, 2024.
The 27 papers presented here were carefully reviewed and selected from 333 submissions. These papers focus on various domains of Cyber warfare and Space computing, including emerging research and applications in the field.
- Security Protocols XXVIII43,99 €
- Critical Information Infrastructures Security37,99 €
- Cyber Warfare, Security and Space Research59,99 €
- Network and System Security66,99 €
- Network and System Security55,99 €
- Trustworthy Computing and Services38,99 €
- Information and Operational Technology Security Systems37,99 €
-
-
-
The 27 papers presented here were carefully reviewed and selected from 333 submissions. These papers focus on various domains of Cyber warfare and Space computing, including emerging research and applications in the field.
- Produktdetails
- Communications in Computer and Information Science 2195
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-73493-9
- Seitenzahl: 388
- Erscheinungstermin: 31. Oktober 2024
- Englisch
- Abmessung: 235mm x 155mm x 21mm
- Gewicht: 587g
- ISBN-13: 9783031734939
- ISBN-10: 3031734939
- Artikelnr.: 71495359
- Communications in Computer and Information Science 2195
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-73493-9
- Seitenzahl: 388
- Erscheinungstermin: 31. Oktober 2024
- Englisch
- Abmessung: 235mm x 155mm x 21mm
- Gewicht: 587g
- ISBN-13: 9783031734939
- ISBN-10: 3031734939
- Artikelnr.: 71495359
.- Hybrid Deep Driven Cross Industry Sentiment Analysis Model for Netizen's Behavioral Characterization.
.- Fake Product Detection using Blockchain with Encryption and AI.
.- S-Defender: A Smishing Detection Approach in Mobile Environment.
.- Mathematical Socio Analysis of Cybercrimes Preparedness A simulation Odessey with R.
.- Revolutionizing Weather Forecasting: Harnessing Machine Learning and Big Data in Upcoming Technologies.
.- Trends in Drowsiness Detection & Analysis of the Different Technologies Engaged.
.- Detecting Local Software Issues Using NSGA Multi-Optimization.
.- Deep Learning and IoT Based Robotics to Monitor the Traffic.
.- Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain Family.
.- Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device.
.- Development of Elliptical Cryptography Technique to Watermark Embedded and extrusion for Healthcare Records.
. -Step-by-Step Image Encryption Using Uaci and Pixadpt.
.- Investigation of Post - Quantum Cryptography to Secure the Functionality of Vehicle Hardware Architecture.
.- Secure Data Management Using BlockChain.
.- Navigating through Digital Realm: Role of Cyberpsychology in Fostering Mental Well-being & Digital Empathy.
.- An Empirical Analysis of Neighborhood-based Approaches for Trustworthy Recommendations with Apache Mahout.
.- Multilingual Sentiment Analysis over Real-time Voice.
.- Identity Verification: A Decentralized KYC Approach Using Blockchain.
.- A Neural Network-based Facial Expressions Detection Technique using CK+ Dataset.
.- Cyber Security Challenges in Industrial Settings with the Internet of Things.
.- Designing Secure Software-Defined Network, Resistant to DDoS Attack Using Non-Linear Routing Rule Installation.
.- NPQuant: A Robust Quantum Inspired Computation Algorithms as an efficient solution to NP-Complete Problems.
.- Impact of Sentiment Analysis in E-Commerce and Cybersecurity.
.- Cultivating Cyber Vigilance: Shaping Employee Behavior for Security Success .
.- A Deep Learning Approach to PDF Malware Detection Enhanced with XAI.
.- Optimized Deep Learning Technique for the Effective Detection of Windows PE malware.
.- Hybrid Deep Driven Cross Industry Sentiment Analysis Model for Netizen's Behavioral Characterization.
.- Fake Product Detection using Blockchain with Encryption and AI.
.- S-Defender: A Smishing Detection Approach in Mobile Environment.
.- Mathematical Socio Analysis of Cybercrimes Preparedness A simulation Odessey with R.
.- Revolutionizing Weather Forecasting: Harnessing Machine Learning and Big Data in Upcoming Technologies.
.- Trends in Drowsiness Detection & Analysis of the Different Technologies Engaged.
.- Detecting Local Software Issues Using NSGA Multi-Optimization.
.- Deep Learning and IoT Based Robotics to Monitor the Traffic.
.- Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain Family.
.- Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device.
.- Development of Elliptical Cryptography Technique to Watermark Embedded and extrusion for Healthcare Records.
. -Step-by-Step Image Encryption Using Uaci and Pixadpt.
.- Investigation of Post - Quantum Cryptography to Secure the Functionality of Vehicle Hardware Architecture.
.- Secure Data Management Using BlockChain.
.- Navigating through Digital Realm: Role of Cyberpsychology in Fostering Mental Well-being & Digital Empathy.
.- An Empirical Analysis of Neighborhood-based Approaches for Trustworthy Recommendations with Apache Mahout.
.- Multilingual Sentiment Analysis over Real-time Voice.
.- Identity Verification: A Decentralized KYC Approach Using Blockchain.
.- A Neural Network-based Facial Expressions Detection Technique using CK+ Dataset.
.- Cyber Security Challenges in Industrial Settings with the Internet of Things.
.- Designing Secure Software-Defined Network, Resistant to DDoS Attack Using Non-Linear Routing Rule Installation.
.- NPQuant: A Robust Quantum Inspired Computation Algorithms as an efficient solution to NP-Complete Problems.
.- Impact of Sentiment Analysis in E-Commerce and Cybersecurity.
.- Cultivating Cyber Vigilance: Shaping Employee Behavior for Security Success .
.- A Deep Learning Approach to PDF Malware Detection Enhanced with XAI.
.- Optimized Deep Learning Technique for the Effective Detection of Windows PE malware.