Description

Misdirection attack in wireless sensor network using  threshold method.- Blockchain for data traceability in the agricultural sector.- Detection of fake URLs using deep LSTM architecture over Social Media.- Leveraging Blockchain for Secure Water Meter Reading.- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem.- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems.- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study.- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem  Max MinSum DP and New Node Similarity based Variants.- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria.- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications.- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks.

Intelligent Systems Design and Applications

Product form

£179.99

Includes FREE delivery
Usually despatched within days
Paperback by Ajith Abraham

1 in stock

Short Description:

Misdirection attack in wireless sensor network using  threshold method.- Blockchain for data traceability in the agricultural sector.- Detection of fake... Read more

    Publisher: Springer
    Publication Date: 7/13/2024
    ISBN13: 9783031646492, 978-3031646492
    ISBN10: 3031646495

    Non Fiction , Computing

    Description

    Misdirection attack in wireless sensor network using  threshold method.- Blockchain for data traceability in the agricultural sector.- Detection of fake URLs using deep LSTM architecture over Social Media.- Leveraging Blockchain for Secure Water Meter Reading.- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem.- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems.- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study.- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem  Max MinSum DP and New Node Similarity based Variants.- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria.- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications.- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks.

    Customer Reviews

    Be the first to write a review
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)

    Recently viewed products

    © 2024 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account