You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16–18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: computational intelligence; cyber security; and computational models.
In the relentless battle against escalating cyber threats, data security faces a critical challenge – the need for innovative solutions to fortify encryption and decryption processes. The increasing frequency and complexity of cyber-attacks demand a dynamic approach, and this is where the intersection of cryptography and machine learning emerges as a powerful ally. As hackers become more adept at exploiting vulnerabilities, the book stands as a beacon of insight, addressing the urgent need to leverage machine learning techniques in cryptography. Machine Learning and Cryptographic Solutions for Data Protection and Network Security unveil the intricate relationship between data security and ...
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications to provide design, analysis, and modeling of the key areas. The book will be useful material for students, researchers, professionals, as well academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.
The five volume set LNCS 7663, LNCS 7664, LNCS 7665, LNCS 7666 and LNCS 7667 constitutes the proceedings of the 19th International Conference on Neural Information Processing, ICONIP 2012, held in Doha, Qatar, in November 2012. The 423 regular session papers presented were carefully reviewed and selected from numerous submissions. These papers cover all major topics of theoretical research, empirical study and applications of neural information processing research. The 5 volumes represent 5 topical sections containing articles on theoretical analysis, neural modeling, algorithms, applications, as well as simulation and synthesis.
This book includes high quality research papers presented at the International Conference on Communication, Computing and Electronics Systems 2021, held at the PPG Institute of Technology, Coimbatore, India, on 28-29 October 2021. The volume focuses mainly on the research trends in cloud computing, mobile computing, artificial intelligence and advanced electronics systems. The topics covered are automation, VLSI, embedded systems, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, communication networks, Internet of Things, cyber-physical systems, and healthcare informatics.
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
World War II is over, and the supermarket shelves are groaning under the weight of thousands of new items. From aerosol sprays to TV dinners to molded plastics--the package designer's task has never been more challenging, or more fun. Designers and pop culture buffs alike will revel in this outstanding portfolio of package design from the mid-1940s to mid-1960s, a veritable social history of postwar consumer culture. 154 color and 17 b&w images.
None