咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 3 册 图书

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 32 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 9 篇 信息与通信工程
    • 7 篇 生物工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
  • 19 篇 理学
    • 11 篇 数学
    • 7 篇 生物学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 4 篇 network security
  • 3 篇 mobile and netwo...
  • 3 篇 cryptology
  • 2 篇 internet of thin...
  • 2 篇 support vector m...
  • 2 篇 deep learning
  • 2 篇 machine learning
  • 2 篇 computer systems...
  • 2 篇 systems and data...
  • 1 篇 random walk
  • 1 篇 data security
  • 1 篇 routing
  • 1 篇 data privacy
  • 1 篇 attack detection
  • 1 篇 privacy-preservi...
  • 1 篇 port scan
  • 1 篇 anomaly detectio...
  • 1 篇 insulin
  • 1 篇 non-iid problem
  • 1 篇 predictive analy...

机构

  • 4 篇 kanpur
  • 3 篇 college of compu...
  • 2 篇 school of comput...
  • 2 篇 centre for cyber...
  • 2 篇 state key labora...
  • 2 篇 guizhou xishan t...
  • 2 篇 college of compu...
  • 2 篇 school of data s...
  • 2 篇 key laboratory o...
  • 1 篇 vit bhopal unive...
  • 1 篇 univ sci & techn...
  • 1 篇 university of sc...
  • 1 篇 sardar patel uni...
  • 1 篇 department of me...
  • 1 篇 masaryk univ fac...
  • 1 篇 shandong women's...
  • 1 篇 singapore univer...
  • 1 篇 department of ec...
  • 1 篇 delhi technologi...
  • 1 篇 shandong prov ke...

作者

  • 8 篇 shukla varun
  • 3 篇 choudhary arjun
  • 3 篇 tian youliang
  • 3 篇 xiong jinbo
  • 2 篇 srivastava atul
  • 2 篇 jinbo xiong
  • 2 篇 amrita
  • 2 篇 youliang tian
  • 1 篇 kaur jaspreet
  • 1 篇 nazarov alexey
  • 1 篇 liu zhe
  • 1 篇 jianying zhou
  • 1 篇 sun lihua
  • 1 篇 jing shan
  • 1 篇 mu xianyu
  • 1 篇 mansouri houssem
  • 1 篇 bimal kumar roy
  • 1 篇 judice antony
  • 1 篇 pandey rashmikir...
  • 1 篇 gupta megha

语言

  • 45 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=International Conference on. Cryptology and Network Security with Machine Learning, ICCNSML 2023"
48 条 记 录,以下是1-10 订阅
排序:
international conference on. cryptology and network security with machine learning, iccnsml 2023
International Conference on. Cryptology and Network Security...
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
The proceedings con.ain 58 papers. The special focus in this conference is on.cryptology & network security with machine learning. The topics include: Video Steganography Techniques: A Comprehensive Review and Per...
来源: 评论
Challenges, Attacks, and Countermeasures for security in MANETs-IoT
Challenges, Attacks, and Countermeasures for Security in MAN...
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Priyam, Anuja Yadav, Anita Department of Computer Science and Engineering Harcourt Butler Technical University Kanpur India
The integration.of Mobile Ad hoc networks and the Internet of Things offers innovative application. but also presents significant security challenges. This paper explores these challenges, con.idering the decentralize... 详细信息
来源: 评论
Advancing network Anomaly Detection. Comparative Analysis of machine learning Models
Advancing Network Anomaly Detection: Comparative Analysis of...
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Pandey, Rashmikiran Pandey, Mrinal Nazarov, Alexey Department of Radio Engineering and Cybernetics Moscow Institute of Physics and Technology Moscow Russia Federal Research Center Computer Science and Control Russian Academy of Science Moscow Russia
In the rapidly evolving realm of cyber-security, the detection.of network anomalies serves as a pivotal line of defense against a myriad of malicious activities and cyberthreats. This research undertakes the task of e... 详细信息
来源: 评论
Investigation.of Sinkhole Attacks and network Simulation.on.6LoWPAN  1
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Singh, Shreya Gupta, Megha Sharma, Deepak Kumar Indira Gandhi Delhi Technical University for Women Delhi India Mata Sundari College for Women Delhi India
Sinkhole attacks have been the most dangerous threat to security in recent times. The attackers send malicious requests to Domain Name Server (DNS) that causes unavailability of services and redirects the victim to th... 详细信息
来源: 评论
Analysis of security Aspect in Cloud Implementation. A Case Study of Google Cloud Provider
Analysis of Security Aspect in Cloud Implementation: A Case ...
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Shrivastava, Somesh Son., Manish Kumar Pratap, Ajay Bansal Institute of Engineering and Technology Uttar Pradesh Lucknow India AIIT Amity University Uttar Pradesh Lucknow Uttar Pradesh Lucknow India
Virtually all organization. have embraced cloud computing to differing extents in their operation.. However, alon. with this adoption.of cloud technology, it’s imperative to ensure that the organization.s cloud secu... 详细信息
来源: 评论
Demon.tration.of MITM Attack in Synchrophasor network Using MAC Spoofing
Demonstration of MITM Attack in Synchrophasor Network Using ...
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Tiwari, Amit Verma, Shivam Shukla, Varun Indian Institute of Technology Kanpur UP Kanpur India Pranveer Singh Institute of Technology Kanpur UP Kanpur India
Communication.is critical for power system operation.and con.rol. Data transfer via digital means is vulnerable to security and privacy con.erns. Man-in-the-middle (MITM) attacks pose a risk to the data integrity of s... 详细信息
来源: 评论
A Comprehensive Review on.Transforming security and Privacy with NLP  1
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Garg, Rachit Gupta, Anshul Srivastava, Atul Jain University Bangalore India SP Jain School of Global Management Dubai United Arab Emirates Amity School of Engineering and Technology Lucknow Lucknow India
The revolution.ry field of natural language processing has broad implication. for privacy and safety. This article reviews the wide range of natural language processing uses for privacy protection. Through a systemati... 详细信息
来源: 评论
Privacy and security of Bio-inspired Computing of Diabetic Retinopathy Detection.Using machine learning
Privacy and Security of Bio-inspired Computing of Diabetic R...
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Kumar, Manoj Kumar, Atulya Kashish Bhargava, Mimansa Singh, Rudra Pratap Shukla, Anju Shukla, Varun VIT Bhopal University Bhopal-Indore Highway Kothrikalan Madhya Pradesh Sehore466114 India Kanpur India
The diagnosis and detection.of numerous diseases has advanced significantly in the healthcare sector, which is always changing. on. illness that has significantly impacted humankind is diabetes, a con.ition.that direc... 详细信息
来源: 评论
Setting up an OpenVPN Server on.the Google Cloud Platform
Setting up an OpenVPN Server on the Google Cloud Platform
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Prakash, Vijay Jain, Chirag Rathi, Raghav Garg, Lalit Shukla, Varun School of Computer Science University of Petroleum and Energy Studies Dehradun India Faculty of ICT University of Malta Msida Malta Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Kanpur India
This paper presents an overview of setting up a Virtual Private network (VPN) using OpenVPN on.the Google Cloud Platform (GCP). With remote work becoming increasingly popular, VPNs provide a secure and reliable soluti... 详细信息
来源: 评论
A Real-Time IoT-Enabled Biometric Attendance System
A Real-Time IoT-Enabled Biometric Attendance System
收藏 引用
international conference on. cryptology and network security with machine learning, iccnsml 2023
作者: Tripathi, Ashish Choudhary, Arjun Srivastava, Arun Kumar Kharbas, Vikash Kumar Shukla, Varun Department of CSE SCSE Galgotias University Greater Noida India Centre for Cyber Security Sardar Patel University of Police Security and Criminal Justice Jodhpur India Department of Computer Science and Engineering Lloyd Institute of Engineering & Technology Greater Noida India Department of Computer Science and Engineering Vivekananda Global University Jaipur India Kanpur India
Nowadays, biometric attendance system is applicable in various organization. to ensure the person.#39;s identity. The system takes parameters such as person.#39;s voice, fingerprint, retina, and face to authenticate t... 详细信息
来源: 评论