Security and Privacy in Smart City Applications and Services: Opportunities and Challenges; A. Verma et al.- A Lightweight Multi-Level Encryption Model for IoT Applications; M. Durairaj, K. Muthuramalingam.- An Efficient Image Encryption Scheme based on Signcryption Technique with Adaptive Elephant Herding Optimization; K. Shankar et al.- Time Split based Pre-processing with a Data-driven Approach for Malicious URL Detection; N.B. Harikrishnan et al.- Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model; A. Sivasankari, S. Krishnaveni.- Deep learning Framework for Cyber Threat Situational Awareness based on Email and URL Data Analysis; R. Vinayakumar et al.- Application of Deep Learning Architectures for Cyber security; R. Vinayakumar et al.- Improved DGA Domain Names Detection and Categorization using Deep learning Architectures with Classical Machine learning Algorithms; R. Vinayakumar et al.- Secure Data Transmission through Reliable Vehicles in VANET using Optimal Lightweight Cryptography; E. Perumal et al.- Some specific examples of attacks on information systems and smart cities applications; M. Saračević et al.- Clustering Based Cybersecurity Model for Cloud Data; A. Bhuvaneshwaran et al.- A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques for Malware Family Identification; S. Akarsh et al.- Design and Implementation of a Research and Education Cybersecurity Operations Center; C. DeCusatis et al.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want