Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24-26, 2023. The book discusses recent developments and contemporary research in cryptography, network security, cybersecurity, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24-26, 2023. The book discusses recent developments and contemporary research in cryptography, network security, cybersecurity, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Jyotsna Kumar Mandal completed M.Tech. (Computer Science, University of Calcutta) and Ph.D. (Engg., Jadavpur University) in the field of Data Compression and Error Correction Techniques and is Professor of Computer Science and Engineering, University of Kalyani, India; Former Director, IQAC, Kalyani University; Life Member of CSI, CRSI; Associate Member ACM, IEEE; Fellow Member of IETE; Former Dean Faculty of Engineering, Technology & Management, working in the field of Network Security, Steganography, Remote Sensing & GIS Application, and Image Processing; 35 years of teaching and research experiences; twenty-eight scholars were awarded Ph.D., four submitted, and eight are pursuing; the total number of publications is more than four hundred in addition of publication of twelve books from LAP Lambert, Germany, and IGI Global; organized 55 conferences of Springer Nature, Elsevier, IEEE, etc.; edited more than 55 proceedings as corresponding editor/editors; Member of NAAC Peer Teamand AICTE Expert Team of EVC; Academic auditor for universities and institutes; delivered more than 100 expert lectures across the globe; Former Member of Governing Council, IETE, Delhi; and received Siksha Ratna Award from Government of W.B. for outstanding performance of teaching and research. Biswapati Jana completed M.Tech. (Computer Science and Engineering, University of Calcutta) and Ph.D. (Computer Science, Vidyasagar University) in the field of Data Hiding Techniques; Associate Professor in Computer Science, Vidyasagar University, India; 20 years of teaching and research experiences; four scholars awarded Ph.D. and six are pursuing; the total number of publications is more than hundred; and delivered more than 25 expert lectures across the globe. He served as Reviewer for a good number of international journals and conferences. His research interest includes Data Hiding, Image Processing, Data Security, Steganography, and Watermarking. Tzu-Chuen Lu received the B.M. degree (1999) and MSIM degree (2001) in Information Management from Chaoyang University of Technology, Taiwan. She received her Ph.D. degree (2006) in Computer Engineering from National Chung Cheng University. Her current title is Professor in Department of Information Management at Chaoyang University of Technology. Debashis De is Professor in Department of Computer Science and Engineering at Maulana Abul Kalam Azad University of Technology, West Bengal, India. He received M.Tech. from the University of Calcutta, 2002, and a Ph.D. from Jadavpur University in 2005. He is Senior Member, IEEE; Fellow, IETE; and Life Member, CSI. He was awarded the prestigious Boyscast Fellowship by the Department of Science and Technology, Government of India, to work at the Heriot-Watt University, Scotland, UK. He received the Endeavour Fellowship Award from 2008-2009 by DEST Australia to work at the University of Western Australia. He received the Young Scientist Award both in 2005 at New Delhi and in 2011 in Istanbul, Turkey, from the International Union of Radio Science, Belgium. In 2016, he received the JC Bose Research Award by IETE, New Delhi. In 2019, he received Shiksha Ratna Award by the Government of West Bengal. He established the Center of Mobile Cloud Computing (CMCC) for IoT applications. He is Vice Chair of Dew Computing STC of IEEE Computer Society. He published in 320 journals and 200 conference papers, fifteen books, and filed ten patents. His h-index is 36; citation 6300; and listed in Top 2% Scientist List of the world, Stanford University, USA. His research interest is Cloud, IoT, and Quantum Computing.
Inhaltsangabe
Machine Learning Based Identification of DDoS Flood Attack in eHealth Cloud Environment.- Machine Learning Based Phishing E-mail Detection using Persuasion Principle and NLP Techniques.- Cryptanalysis and improvement of a mutual authentication scheme for smart grid communications.- Collision Avoidance and Drowsiness Detection System for Drivers.- A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling.- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation.- Face Mask Detection Exploiting CNN and MOBILENETV.- Malicious Transaction URL Detection Using Logistic Regression.- Secured Information Communication exploiting Fuzzy weight strategy.- Secure Data Communication Through Improved Multi-Level Pixel Value Ordering using Center-Folding Strategy.- Perseverance of the Audio Data using RNN Implied Matrix Segmentation based Lossless Encoder.- SVD based Watermarking Scheme for Medical ImageAuthentication.- Watermark based Image Authentication with Coefficient Value Differencing and Histogram Shifting.- IEMS3: An Image Encryption Scheme Using Modified SNOW 3G Algorithm.
Machine Learning Based Identification of DDoS Flood Attack in eHealth Cloud Environment.- Machine Learning Based Phishing E-mail Detection using Persuasion Principle and NLP Techniques.- Cryptanalysis and improvement of a mutual authentication scheme for smart grid communications.- Collision Avoidance and Drowsiness Detection System for Drivers.- A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling.- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation.- Face Mask Detection Exploiting CNN and MOBILENETV.- Malicious Transaction URL Detection Using Logistic Regression.- Secured Information Communication exploiting Fuzzy weight strategy.- Secure Data Communication Through Improved Multi-Level Pixel Value Ordering using Center-Folding Strategy.- Perseverance of the Audio Data using RNN Implied Matrix Segmentation based Lossless Encoder.- SVD based Watermarking Scheme for Medical ImageAuthentication.- Watermark based Image Authentication with Coefficient Value Differencing and Histogram Shifting.- IEMS3: An Image Encryption Scheme Using Modified SNOW 3G Algorithm.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826