000 | 04186nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-981-99-4433-0 | ||
003 | DE-He213 | ||
005 | 20250516155933.0 | ||
007 | cr nn 008mamaa | ||
008 | 231128s2024 si | s |||| 0|eng d | ||
020 |
_a9789819944330 _9978-981-99-4433-0 |
||
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aProceedings of International Conference on Network Security and Blockchain Technology _h[electronic resource] : _bICNSBT 2023 / _cedited by Jyotsna Kumar Mandal, Biswapati Jana, Tzu-Chuen Lu, Debashis De. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXXVI, 537 p. 274 illus., 211 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Networks and Systems, _x2367-3389 ; _v738 |
|
505 | 0 | _aMachine Learning Based Identification of DDoS Flood Attack in eHealth Cloud Environment -- Machine Learning Based Phishing E-mail Detection using Persuasion Principle and NLP Techniques -- Cryptanalysis and improvement of a mutual authentication scheme for smart grid communications -- Collision Avoidance and Drowsiness Detection System for Drivers -- A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling -- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation -- Face Mask Detection Exploiting CNN and MOBILENETV -- Malicious Transaction URL Detection Using Logistic Regression -- Secured Information Communication exploiting Fuzzy weight strategy -- Secure Data Communication Through Improved Multi-Level Pixel Value Ordering using Center-Folding Strategy -- Perseverance of the Audio Data using RNN Implied Matrix Segmentation based Lossless Encoder -- SVD based Watermarking Scheme for Medical ImageAuthentication -- Watermark based Image Authentication with Coefficient Value Differencing and Histogram Shifting -- IEMS3: An Image Encryption Scheme Using Modified SNOW 3G Algorithm. | |
520 | _aThe book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24-26, 2023. The book discusses recent developments and contemporary research in cryptography, network security, cybersecurity, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aTelecommunication. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aBlockchains (Databases). | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aBlockchain. |
650 | 2 | 4 | _aArtificial Intelligence. |
700 | 1 |
_aMandal, Jyotsna Kumar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJana, Biswapati. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLu, Tzu-Chuen. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDe, Debashis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819944323 |
776 | 0 | 8 |
_iPrinted edition: _z9789819944347 |
830 | 0 |
_aLecture Notes in Networks and Systems, _x2367-3389 ; _v738 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-99-4433-0 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c273691 _d273690 |