Soft Computing for Security Applications 1st Edition by G Ranganathan, Xavier Fernando, Fuqian Shi, Youssouf El Allioui – Ebook PDF Instant Download/Delivery: 9789811653001 ,9811653003
Full download Soft Computing for Security Applications 1st Edition after payment
Product details:
ISBN 10: 9811653003
ISBN 13: 9789811653001
Author: G Ranganathan, Xavier Fernando, Fuqian Shi, Youssouf El Allioui
Soft Computing for Security Applications 1st Edition Table of contents:
- Facial Image Denoising and Reconstruction
- One Method for RC5 Algorithm’s Cryptographic Strength Improving
- Multiclass Classification of Firewall Log Files Using Shallow Neural Network for Network Security Applications
- On the Possibility of Evasion Attacks with Macro Malware
- IoT-Based Smart Crop Field Monitoring and Protection System from Heavy Rainfall Utilizing Raspberry Pi
- A Systematic Review of Adoption of Blockchain and Machine Learning Technology and Its Application
- Review of Malicious URL Detection Using Machine Learning
- Securing IoT Using Artificial Intelligence and Feature Engineering
- A Novel Framework for NIDS Using Stacked Ensemble Learning
- Butterfly Algorithm Boosted Deep Random Vector Functional Link Network for Keystroke Dynamics
- Hybrid Context-Aware Recommendation System Using Deep Autoencoder
- Exploration and Implementation of RSA-KEM Algorithm
- Botnet Attack Detection Using Machine Learning Algorithm Integrated With Ensemble Algorithm
- Artificial Intelligence-Based Automation System for Health Care Applications: Medbot
- An Approach for Maintaining Safety at Work Places During the COVID-19 Pandemic Using Deep Learning and Contact Tracing Applications
- Online Certificate Generation and Verification Using Blockchain Framework
- A Survey on LiDAR-Based SLAM Technique for an Autonomous Model Using Particle Filters
- TrafficNN: CNN-Based Road Traffic Conditions Classification
- Review of Malware Detection Using Deep Learning
- ANN Based Hybrid RSSI-TDOA DOA Estimation and Beamforming
- FPGA Implementation of Nested Binary Phase Codes Using DDS Approach for Radar Pulse Compression
- Cloud Computing-Based Li-Ion Battery-BMS Design for Constant DC Load Applications
- Three-Level Hybrid Data Security
- Brain Tumour MRI Image Segmentation and Classification Using FCNN
- Decentralized Cloud and File System for Blockchain Environment
- A Network Investigation Framework Based on Deep Learning for Fraud Transaction Detection
- Coverage Using Swarm Intelligence Family in Wireless Sensor Networks
- IOT-Based Remote Patient Monitoring System Using Microservices Architecture
- Detection and Prevention of Faulty Node in Heterogeneous Wireless Sensor Network
- Classification of Fake News on Twitter by Using Naïve Bayes Classifier
- Enhancing the Security in Wireless Sensor Network Using Hidden Markov Model
- Trust-Based Security Scheme Using Fuzzy Clustering for Vehicular Ad Hoc Networks
- AquaVision: Real-Time Identification of Microbes in Freshwater Using YOLOv3
- Gender and Age Recognition Using Audio Data—Artificial Neural Networks
- Merging Data Analytics and Machine Learning Algorithm for Home System Security-Based Internet of Things
- Multiple Approach of RFID-Based Attendance System Using IoT
- Review of Deep Learning and Interpretability
- Enhancement of Network Security Through Intrusion Detection
- Optimization of Cost of Smart Grid: A Case Study of Kutch, Gujarat Using HOMER Software
- Agriculture Protection from Animals Using Smart Scarecrow System
- Literature Review on Redistribution of Routing Protocols in Wireless Networks Using SDN Along with NFV
- NewsCheck: A Fake News Detection and Analysis System
- A Predictive Model of Handwritten Digits Recognition Using Expert Systems
- A Review of Deepfake Technology: An Emerging AI Threat
- Robust Image Watermarking Using LWT Transform and Stacking Ensemble Classifier
- Deep Learning Approach for Stock Price Prediction and Trading
- Robust Symmetric Encryption for Public Key Infrastructure
- Big Social Data Analytics
- A Study on Cloud Environment: Confidentiality Problems, Security Threats, and Challenges
- Security Issues of IoT in Healthcare Sector: A Systematic Review
- Resume Screening Bot Using RPA
- Image Enhancement and Object Recognition for Night Vision Traffic Surveillance
- Cyberbullying Detection in Native Languages
- Intrusion Detection Framework Using an Improved Deep Reinforcement Learning Technique for IoT Network
- A Survey of Data Mining Techniques in the Field of Cyborg Mining
- BDFN: A Bilingual Model to Detect Online Fake News Using Machine Learning Technique
- Deep Learning Framework for Lung Disease Prognosis Using X-Ray Image
- Combined PCA–Segmentation Method: An Efficient Technique for Covered Face Recognition
- Recent Advances in Transform and Hybrid Domain Digital Watermarking Techniques—A Survey
- Improved Genetic Algorithm Using Machine Learning Approaches to Feature Modelled for Microarray Gene Data
- Improved Image Enhancement of Natural Images with Median Mean-Based Sub-Image Clipped Histogram Equalization
- Detection of DDoS Attack Using Ensemble Machine Learning Techniques
- Cyberbullying Detection and Prevention Using Artificial Intelligence
- Location Prediction on Twitter Using Hybrid Model
- Investigation of SAC-OCDMA FSO System Performance Under Fog Attenuation Conditions Using DW-ZCC Code
- An Approach to Predict the Location of Crime Using Machine Learning
- Privacy-Preserving in Fingerprint Templates Security Using Combinatorial Logic Circuits
People also search for Soft Computing for Security Applications 1st Edition:
application software security
security software is an example of what type of software
application software policies
soft computing for security optimization
soft computing and cybersecurity