Arama Sonuçları - "security analysis"

  • Gösterilen 1 - 13 sonuçlar arası kayıtlar. 13
Sonuçları Daraltın
  1. 1

    SDN and NFV Security Security Analysis of Software-Defined Networking and Network Function Virtualization /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    Full-text access
    e-Kitap
  2. 2

    RFID Security A Lightweight Paradigm / Yazar: Khattab, Ahmed, Jeddi, Zahra, Amini, Esmaeil, Bayoumi, Magdy

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2017.
    İçindekiler: “…RBS Cryptosystem -- 5. RBS Security Analysis -- 6. RBS Performance Evaluation -- 7. …”
    Full-text access
    e-Kitap
  3. 3

    Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics ICACNI 2015, Volume 2 /

    Baskı/Yayın Bilgisi Springer India : Imprint: Springer, 2016.
    İçindekiler: “…Section A: Distributed Systems, Social Networks, and Applications -- Section B: Networking systems and Architectures -- Section C: Research on Wireless Sensor Networks, VANETs, and MANETs -- Section D: Cryptography and Security Analysis -- Section E: Operating System and Software Analysis -- Section F: Internet, Web Technology, and Web Security -- Section G: Big Data and Recommendation Systems -- Section H: Fault and Delay Tolerant Systems -- Section I: Satellite Communication, Antenna Research, and Cognitive Radio.…”
    Full-text access
    e-Kitap
  4. 4

    Big Data and Smart Digital Environment

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…A smart parking for invisible disabilities -- Smart water management: Pillars and Technologies -- Integrating ICT in Education: An Adaptive Learning System Based on Users' Context in Mobile Environments -- Modified Strategy of Direct Torque Control Applied to Asynchronous Motor based on PI Regulators -- Managing Temporal and Versioning Aspects of JSON-based Big Data via the τJSchema Framework -- Specific Qualification for Information System Components from Managers and Technical Staff Perspective -- A clustering-based method for detecting text area in videos recorded with the aid of a smartphone -- Chipless RFID Tag Using Multiple G-Shaped Resonators -- Security Analysis of Ye et al. Authentication Protocol for Internet of Things.…”
    Full-text access
    e-Kitap
  5. 5

    Recent Advances in Systems Safety and Security

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2016.
    İçindekiler: “…The Theory of Witness Functions -- Quantification of Centralized/Distributed Secrecy in Stochastic Discrete Event Systems -- Framework for Cognitive Radio Deployment in Large Scale WSN-UAV Surveillance -- Using Modeling and Dynamic Simulation Techniques for Systems' Safety and Security -- HAZOP-based Security Analysis for Embedded Systems: Case Study of Open Source Immobilizer Protocol Stack -- Multimodal Heterogeneous Monitoring Of Super-Extended Objects: Modern View -- Image Based Control of a Simple Mobile Robotic System -- On using a Cloud-Based Approach to Develop a Mobile Asset Management Solution -- Execution of an IEC61499 Application on a Remote Server -- Evolution of Legal Issues of Honey nets -- A Risk Screening System by Network Diagram Recognition for Information Security Audit -- Risk Analysis and Optimal Model for Efficiency of Reengineering the Independent Power Grids -- Innovative Fuzzy Approach on Analyzing IndustrialControl Systems -- IPv6 Sensor Networks Modeling for Security and Communication Evaluation.…”
    Full-text access
    e-Kitap
  6. 6

    Distributed Transmission-Distribution Coordinated Energy Management Based on Generalized Master-Slave Splitting Theory Yazar: Li, Zhengshuo

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2018.
    Full-text access
    e-Kitap
  7. 7

    Security with Intelligent Computing and Big-data Services

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    Full-text access
    e-Kitap
  8. 8

    Information Security Practices Emerging Threats and Perspectives /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2017.
    Full-text access
    e-Kitap
  9. 9

    Speech and Language Processing for Human-Machine Communications Proceedings of CSI 2015 /

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2018.
    İçindekiler: “…AC: An Audio Classifier to Classify Violent Extensive Audios -- Document-to-Sentence Level Technique for Novelty Detection -- Continuous Hindi Speech Recognition in Real Time Using NI LabVIEW -- Gujarati Braille Text Recognition: A Design Approach -- Development of Embedded Platform for Sanskrit Grammar-Based Document Summarization -- Approach for Information Retrieval by Using Self Organizing Map and Crisp Set -- An Automatic Spontaneous Speech Recognition System for Punjabi Language -- A System for the Conversion of Digital Gujarati Text to Speech for Visually Impaired People -- Hidden Markov Model for Speech Recognition System- A Pilot Study and a Naive Approach for Speech-to-Text Model -- Speaker Independent Recognition System for Continuous Hindi Speech Using Probabilistic Model -- A Robust Technique for Handwritten Words Segmentation into Individual Characters -- Developing Speech-Based Web Browsers for Visually Impaired Users -- Adaptive Infrared Images Enhancement Using Fuzzy Based Concepts -- Towards Machine Translation Linguistic Issues of Indian Sign Language -- Analysis of Emotion Recognition System for Telugu Using Prosodic and Formant Features -- Simple Term Filtering for Location-Based Tweets Classification -- Security Analysis of Scalable Speech Coders -- Issues in i-vector modeling: An analysis of total variability space and UBM size -- Acoustic Representation of Monophthongs with Special Reference to Bodo Language -- Detection of Human Emotion from Speech - Tools and Techniques -- Phonetic Transcription Comparison for Emotional Database for Speech Synthesis -- The State-of-the-Art of Feature Extraction Techniques in Speech Recognition -- Challenges and Issues in Adopting Speech Recognition.…”
    Full-text access
    e-Kitap
  10. 10

    Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 /

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2017.
    İçindekiler: “…Open Source Big Data Analytics Technique -- Chapter 59. Security Analysis of Online Cab Booking Android Application -- Chapter 60. …”
    Full-text access
    e-Kitap
  11. 11

    Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 1 /

    Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2016.
    İçindekiler: “…A Semi Circular Monopole Antenna for Ultra Wide Band Applications -- Chapter 37. Security Analysis of Different LFSR Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks -- Chapter 38. …”
    Full-text access
    e-Kitap
  12. 12

    Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing ICRCWIP-2014 /

    Baskı/Yayın Bilgisi Springer India : Imprint: Springer, 2016.
    İçindekiler: “…A Noval Image Zooming Technique using Wavelet Coefficients -- Analysis of Operational Transformation Algorithms -- A Digital Image Watermarking Technique using Cascading of DCT and Biorthogonal Wavelet Transform -- Multi-Domain Image Enhancement of Foggy Images using Contrast Limited Adaptive Histogram Equalization Method -- Comparison of Various Reliability Measures of a Computer System with the Provision of Priority -- Dual Band Filter using DGS for X-Band Applications -- A Review on Performance Evaluation of Routing Protocols in MANET -- Retinal Nerve Fiber Layer analysis in Digital Fundus Images: Application to Early Glaucoma Diagnosis -- Design, Development of MC-CDMA & Reduction of ISI for Different Modulation Techniques -- A Compact Dual Wide Band Patch Antenna with Modified Ground Plane -- Contention Sensitive Routing for Mobile Ad Hoc Networks -- An analytical Approach for Fine Tuning of Resonant Frequency of MSPA using Dielectric Constant Engineering (DCE) -- Design of Can Based Enhanced Event Data Recorder & Evidence Collecting System -- Detection of Brain Tumor in MRI Images, using Fuzzy C-Means Segmented Images and Artificial Neural Networks -- Multiple Inputs Combinational Logic Minimization by Minterms Set -- Design and Simulation of 16X8 Synchronous SRAM in 90nm CMOS Technology -- A Voltage-Mode Non-Linear-Synapse Neural Circuit for Bi-Partitioning of Graphs -- CNFET-Based Resistive Sensor Interface with Voltage/Current-Mode Readouts -- Design of CMOS Ring Oscillators with Low Phase Noise and Power Dissipation for Data Transmission in RF Range -- A Novel Hybrid Method for Segmentation of Ultrasound Images -- Temperature Sensor using a SMF-PCF-SMF Heterostructure -- investigation of Channel Drop Filter Based on Two Dimensional Photonic Crystal Structure -- Design and analysis of a Nano-Fiber with all-Normal and Flat Dispersion for Supercontinuum Generation -- Investigation of Semiconductor Optical Amplifier for DWDM System with 50GHz Channel Spacing -- Automatic License Plate Recognition System using Raspberry Pi -- Multiple Sink Data Aggregation -- Handwritten Devnagari Script Database Development for Off-line Hindi Character with Matra (Modifiers) -- Part-of-Speech Tagging of Hindi Corpus using Rule-Based Method -- A Survey on Security Analysis in Cloud Computing -- Copper Nanofilm Antenna Design and Development: for X Band Wireless Sensor Applications. …”
    Full-text access
    e-Kitap
  13. 13

    Proceedings of International Conference on Artificial Intelligence and Applications : Icaia 2020. Yazar: Bansal, Poonam

    Baskı/Yayın Bilgisi Springer Singapore Pte. Limited, 2020.
    İçindekiler: “…References -- Cryptosystem Based on Hybrid Chaotic Structured Phase Mask and Hybrid Mask Using Gyrator Transform -- 1 Introduction -- 2 Theoretical Background -- 2.1 Gyrator Transform -- 2.2 Hybrid Chaotic Structured Phase Mask -- 2.3 Hybrid Mask -- 3 Proposed Work -- 4 Results -- 5 Conclusion -- References -- PE File-Based Malware Detection Using Machine Learning -- 1 Introduction -- 1.1 Static Analysis -- 1.2 Dynamic Analysis -- 2 Related Work -- 3 Discussion -- 4 Conclusion -- References -- Intelligence Graphs for Threat Intelligence and Security Policy Validation of Cyber Systems -- 1 Logical Vulnerability, Threats and Risks in Cyber Security -- 2 Ontologies, Knowledge Graphs and Process Workflows -- 3 Ontology of Transactions Under Security Threats -- 3.1 Logical Foundations of the Ontological Modelling -- 3.2 Situations, Events, Threats and Items -- 3.3 Actions -- 3.4 Parametrization -- 4 Heuristic Level and Security Policies -- 4.1 Security Policies as Heuristics -- 4.2 Types of Heuristics -- 4.3 Examples of Heuristic Rules -- 5 Workflow Level and Intelligence Graphs -- 5.1 Transaction Flow as a Graph -- 5.2 Framework Validation -- 6 Process Level, Implementation and Future Work -- References -- Anomaly Detection Using Federated Learning -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 Anomaly Detection -- 2.3 Deep Learning -- 2.4 Artificial Neutral Network -- 2.5 Autoencoder -- 3 Experiment -- 4 Result -- 5 Conclusion -- References -- Enhanced Digital Image Encryption Using Sine Transformed Complex Chaotic Sequence -- 1 Introduction -- 1.1 Chaotic Theory -- 2 Proposed Encryption Strategy -- 2.1 Surrounding Pixel Matrix Using SHA-256 -- 2.2 STLS -- 2.3 Image Matrix Permutation -- 2.4 Hybrid Rotation -- 2.5 Diffusion -- 3 Simulation Example -- 4 Results -- 4.1 Security Analysis of Secret Key.…”
    Full-text access
    e-Kitap