Advances in Cyber Security and Intelligent Analytics (eBook, ePUB)
Redaktion: Verma, Abhishek; Balas, Valentina Emilia; Singh, Vrijendra; Gaur, Hari Mohan; Kumar, Jitendra
46,95 €
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
46,95 €
Als Download kaufen
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
23 °P sammeln
Advances in Cyber Security and Intelligent Analytics (eBook, ePUB)
Redaktion: Verma, Abhishek; Balas, Valentina Emilia; Singh, Vrijendra; Gaur, Hari Mohan; Kumar, Jitendra
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 4.94MB
Andere Kunden interessierten sich auch für
- Cybersecurity Issues in Emerging Technologies (eBook, ePUB)46,95 €
- Research Advances in Intelligent Computing (eBook, ePUB)51,95 €
- Advances in Cyber Security and Intelligent Analytics (eBook, PDF)46,95 €
- Michael MeloneDesigning Secure Systems (eBook, ePUB)46,95 €
- Sonali GoyalAn Integrated Approach to Home Security and Safety Systems (eBook, ePUB)46,95 €
- Secure and Smart Cyber-Physical Systems (eBook, ePUB)51,95 €
- Artificial Intelligence & Blockchain in Cyber Physical Systems (eBook, ePUB)51,95 €
-
-
-
The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 312
- Erscheinungstermin: 21. Dezember 2022
- Englisch
- ISBN-13: 9781000821451
- Artikelnr.: 66653282
- Verlag: Taylor & Francis
- Seitenzahl: 312
- Erscheinungstermin: 21. Dezember 2022
- Englisch
- ISBN-13: 9781000821451
- Artikelnr.: 66653282
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Abhishek Verma, Vrijendra Singh
1 Edge computing-enabled secure information-centric networking: Privacy
challenges, benefits, and future trends
KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA
2 Weighted attack graphs and behavioral cyber game theory for cyber risk
quantification
FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN
3 NetFlow-based botnet detection in IoT edge environment using ensemble
gradient boosting machine learning framework
D. SANTHADEVI AND B. JANET
4 Exploring the possibility of blockchain and smart contract-based digital
certificate
P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity
range
NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH
6 Addressing the cybersecurity issues in cloud computing
SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD
7 Role of medical image encryption algorithms in cloud platform for
teleradiology applications
SIJU JOHN AND S. N. KUMAR
8 Machine-learning approach for detecting cyberattacks in Medical Internet
of Things
THULASI M. SANTHI AND M. C. HELEN MARY
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and
optimization algorithms and open issues
ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA
10 A capability maturity model and value judgment systems for a distributed
network of ethical and context aware digital twin agents
MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID
11 A detailed cram on artificial intelligence industrial systems 4.0
P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE
THERESE, A. DEVI, AND K. VENKATALAKSHMI
12 Ensuring liveliness property in safety-critical systems
ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR
13 Machine learning for intelligent analytics
JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL
14 Secure 3D route optimization of combat vehicles in war field using IoV
ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA
15 Healthcare therapy for treating teenagers with internet addiction using
behavioral patterns and neuro-feedback analysis
B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH
16 Containerization in cloud computing for OS-level virtualization
MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK
17 An adaptive deep learning approach for stock price forecasting
RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA
challenges, benefits, and future trends
KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA
2 Weighted attack graphs and behavioral cyber game theory for cyber risk
quantification
FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN
3 NetFlow-based botnet detection in IoT edge environment using ensemble
gradient boosting machine learning framework
D. SANTHADEVI AND B. JANET
4 Exploring the possibility of blockchain and smart contract-based digital
certificate
P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity
range
NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH
6 Addressing the cybersecurity issues in cloud computing
SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD
7 Role of medical image encryption algorithms in cloud platform for
teleradiology applications
SIJU JOHN AND S. N. KUMAR
8 Machine-learning approach for detecting cyberattacks in Medical Internet
of Things
THULASI M. SANTHI AND M. C. HELEN MARY
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and
optimization algorithms and open issues
ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA
10 A capability maturity model and value judgment systems for a distributed
network of ethical and context aware digital twin agents
MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID
11 A detailed cram on artificial intelligence industrial systems 4.0
P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE
THERESE, A. DEVI, AND K. VENKATALAKSHMI
12 Ensuring liveliness property in safety-critical systems
ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR
13 Machine learning for intelligent analytics
JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL
14 Secure 3D route optimization of combat vehicles in war field using IoV
ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA
15 Healthcare therapy for treating teenagers with internet addiction using
behavioral patterns and neuro-feedback analysis
B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH
16 Containerization in cloud computing for OS-level virtualization
MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK
17 An adaptive deep learning approach for stock price forecasting
RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA
1 Edge computing-enabled secure information-centric networking: Privacy
challenges, benefits, and future trends
KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA
2 Weighted attack graphs and behavioral cyber game theory for cyber risk
quantification
FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN
3 NetFlow-based botnet detection in IoT edge environment using ensemble
gradient boosting machine learning framework
D. SANTHADEVI AND B. JANET
4 Exploring the possibility of blockchain and smart contract-based digital
certificate
P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity
range
NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH
6 Addressing the cybersecurity issues in cloud computing
SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD
7 Role of medical image encryption algorithms in cloud platform for
teleradiology applications
SIJU JOHN AND S. N. KUMAR
8 Machine-learning approach for detecting cyberattacks in Medical Internet
of Things
THULASI M. SANTHI AND M. C. HELEN MARY
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and
optimization algorithms and open issues
ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA
10 A capability maturity model and value judgment systems for a distributed
network of ethical and context aware digital twin agents
MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID
11 A detailed cram on artificial intelligence industrial systems 4.0
P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE
THERESE, A. DEVI, AND K. VENKATALAKSHMI
12 Ensuring liveliness property in safety-critical systems
ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR
13 Machine learning for intelligent analytics
JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL
14 Secure 3D route optimization of combat vehicles in war field using IoV
ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA
15 Healthcare therapy for treating teenagers with internet addiction using
behavioral patterns and neuro-feedback analysis
B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH
16 Containerization in cloud computing for OS-level virtualization
MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK
17 An adaptive deep learning approach for stock price forecasting
RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA
challenges, benefits, and future trends
KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA
2 Weighted attack graphs and behavioral cyber game theory for cyber risk
quantification
FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN
3 NetFlow-based botnet detection in IoT edge environment using ensemble
gradient boosting machine learning framework
D. SANTHADEVI AND B. JANET
4 Exploring the possibility of blockchain and smart contract-based digital
certificate
P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity
range
NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH
6 Addressing the cybersecurity issues in cloud computing
SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD
7 Role of medical image encryption algorithms in cloud platform for
teleradiology applications
SIJU JOHN AND S. N. KUMAR
8 Machine-learning approach for detecting cyberattacks in Medical Internet
of Things
THULASI M. SANTHI AND M. C. HELEN MARY
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and
optimization algorithms and open issues
ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA
10 A capability maturity model and value judgment systems for a distributed
network of ethical and context aware digital twin agents
MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID
11 A detailed cram on artificial intelligence industrial systems 4.0
P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE
THERESE, A. DEVI, AND K. VENKATALAKSHMI
12 Ensuring liveliness property in safety-critical systems
ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR
13 Machine learning for intelligent analytics
JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL
14 Secure 3D route optimization of combat vehicles in war field using IoV
ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA
15 Healthcare therapy for treating teenagers with internet addiction using
behavioral patterns and neuro-feedback analysis
B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH
16 Containerization in cloud computing for OS-level virtualization
MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK
17 An adaptive deep learning approach for stock price forecasting
RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA