Soft Computing for Security Applications 1st Edition by G Ranganathan, Xavier Fernando, Fuqian Shi, Youssouf El Allioui – Ebook PDF Instant Download/Delivery: 9789811653001 ,9811653003
Full download Soft Computing for Security Applications 1st Edition after payment

Product details:
ISBN 10: 9811653003
ISBN 13: 9789811653001
Author: G Ranganathan, Xavier Fernando, Fuqian Shi, Youssouf El Allioui
Soft Computing for Security Applications 1st Edition Table of contents:
- Facial Image Denoising and Reconstruction
 - One Method for RC5 Algorithm’s Cryptographic Strength Improving
 - Multiclass Classification of Firewall Log Files Using Shallow Neural Network for Network Security Applications
 - On the Possibility of Evasion Attacks with Macro Malware
 - IoT-Based Smart Crop Field Monitoring and Protection System from Heavy Rainfall Utilizing Raspberry Pi
 - A Systematic Review of Adoption of Blockchain and Machine Learning Technology and Its Application
 - Review of Malicious URL Detection Using Machine Learning
 - Securing IoT Using Artificial Intelligence and Feature Engineering
 - A Novel Framework for NIDS Using Stacked Ensemble Learning
 - Butterfly Algorithm Boosted Deep Random Vector Functional Link Network for Keystroke Dynamics
 - Hybrid Context-Aware Recommendation System Using Deep Autoencoder
 - Exploration and Implementation of RSA-KEM Algorithm
 - Botnet Attack Detection Using Machine Learning Algorithm Integrated With Ensemble Algorithm
 - Artificial Intelligence-Based Automation System for Health Care Applications: Medbot
 - An Approach for Maintaining Safety at Work Places During the COVID-19 Pandemic Using Deep Learning and Contact Tracing Applications
 - Online Certificate Generation and Verification Using Blockchain Framework
 - A Survey on LiDAR-Based SLAM Technique for an Autonomous Model Using Particle Filters
 - TrafficNN: CNN-Based Road Traffic Conditions Classification
 - Review of Malware Detection Using Deep Learning
 - ANN Based Hybrid RSSI-TDOA DOA Estimation and Beamforming
 - FPGA Implementation of Nested Binary Phase Codes Using DDS Approach for Radar Pulse Compression
 - Cloud Computing-Based Li-Ion Battery-BMS Design for Constant DC Load Applications
 - Three-Level Hybrid Data Security
 - Brain Tumour MRI Image Segmentation and Classification Using FCNN
 - Decentralized Cloud and File System for Blockchain Environment
 - A Network Investigation Framework Based on Deep Learning for Fraud Transaction Detection
 - Coverage Using Swarm Intelligence Family in Wireless Sensor Networks
 - IOT-Based Remote Patient Monitoring System Using Microservices Architecture
 - Detection and Prevention of Faulty Node in Heterogeneous Wireless Sensor Network
 - Classification of Fake News on Twitter by Using Naïve Bayes Classifier
 - Enhancing the Security in Wireless Sensor Network Using Hidden Markov Model
 - Trust-Based Security Scheme Using Fuzzy Clustering for Vehicular Ad Hoc Networks
 - AquaVision: Real-Time Identification of Microbes in Freshwater Using YOLOv3
 - Gender and Age Recognition Using Audio Data—Artificial Neural Networks
 - Merging Data Analytics and Machine Learning Algorithm for Home System Security-Based Internet of Things
 - Multiple Approach of RFID-Based Attendance System Using IoT
 - Review of Deep Learning and Interpretability
 - Enhancement of Network Security Through Intrusion Detection
 - Optimization of Cost of Smart Grid: A Case Study of Kutch, Gujarat Using HOMER Software
 - Agriculture Protection from Animals Using Smart Scarecrow System
 - Literature Review on Redistribution of Routing Protocols in Wireless Networks Using SDN Along with NFV
 - NewsCheck: A Fake News Detection and Analysis System
 - A Predictive Model of Handwritten Digits Recognition Using Expert Systems
 - A Review of Deepfake Technology: An Emerging AI Threat
 - Robust Image Watermarking Using LWT Transform and Stacking Ensemble Classifier
 - Deep Learning Approach for Stock Price Prediction and Trading
 - Robust Symmetric Encryption for Public Key Infrastructure
 - Big Social Data Analytics
 - A Study on Cloud Environment: Confidentiality Problems, Security Threats, and Challenges
 - Security Issues of IoT in Healthcare Sector: A Systematic Review
 - Resume Screening Bot Using RPA
 - Image Enhancement and Object Recognition for Night Vision Traffic Surveillance
 - Cyberbullying Detection in Native Languages
 - Intrusion Detection Framework Using an Improved Deep Reinforcement Learning Technique for IoT Network
 - A Survey of Data Mining Techniques in the Field of Cyborg Mining
 - BDFN: A Bilingual Model to Detect Online Fake News Using Machine Learning Technique
 - Deep Learning Framework for Lung Disease Prognosis Using X-Ray Image
 - Combined PCA–Segmentation Method: An Efficient Technique for Covered Face Recognition
 - Recent Advances in Transform and Hybrid Domain Digital Watermarking Techniques—A Survey
 - Improved Genetic Algorithm Using Machine Learning Approaches to Feature Modelled for Microarray Gene Data
 - Improved Image Enhancement of Natural Images with Median Mean-Based Sub-Image Clipped Histogram Equalization
 - Detection of DDoS Attack Using Ensemble Machine Learning Techniques
 - Cyberbullying Detection and Prevention Using Artificial Intelligence
 - Location Prediction on Twitter Using Hybrid Model
 - Investigation of SAC-OCDMA FSO System Performance Under Fog Attenuation Conditions Using DW-ZCC Code
 - An Approach to Predict the Location of Crime Using Machine Learning
 - Privacy-Preserving in Fingerprint Templates Security Using Combinatorial Logic Circuits
 
People also search for Soft Computing for Security Applications 1st Edition:
    
application software security
    
security software is an example of what type of software
    
application software policies
    
soft computing for security optimization
    
soft computing and cybersecurity


