Mostrando 1 - 1 Resultados de 1 Para Buscar 'Shiv Kumar', tiempo de consulta: 0.04s Limitar resultados
  1. 1
    Publicado 2023
    Tabla de Contenidos: “…Prem Laxman Das -- Analysis of quantum computing with food processing use case / Dhaval S Jha, Het Shah and Jai Prakash Verma -- Security of modern networks and its challenges / Apurv Garg, Bhartendu Sharma, Anmol Gupta and Rijwan Khan -- Security and performance analysis of advanced metering infrastructure in smart grid and use of blockchain in security perspective / Khushboo Gupta and Vinod Kumar -- Computation and storage efficient key distribution protocol for secure multicast communication in centralized environments / Vinod Kumar, Khushboo Gupta, Om Pal, Rajendra Kumar, Pradeep Kumar Tiwari, Narendra Kumar Updhyay and Mukesh Kumar Bhardwaj -- Effective key agreement protocol for large and dynamic groups using elliptic curve cryptography / Vinod Kumar, Khushboo Gupta, Om Pal, Shiv Prakash, Pravin Kumar, Shiv Veer Singh, Pradeep Kumar Tiwari and Animesh Tripathi -- Cyber security using artificial intelligence / Sapna Katiyar -- Cloud computing : an overview of security risk assessment models & frameworks / Subarna Ghosh, Nafees Mansoor and Mohammad Shahriar Rahman -- Generating cyber threat intelligence to discover potential security threats using classification and topic modeling / Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed and Mohammed Masudur Rahman -- Cyber-physical energy systems security : attacks, vulnerabilities and risk management / Sayada Sonia Akter, Rezwan Ahmed, Ferdous Hasan Khan and Mohammad Shahriar Rahman -- Intrusion detection using machine learning / Rijwan Khan, Aditi Tiwari, Aashna Kapoor and Abhyudaya Mittal -- Network forensic / Sandeep Kaur, Manjit Sandhu, Sandeep Sharma and Ravinder Singh Sawhney -- A deep neural network based biometric random key generator for security -- enhancement / Sannidhan M S, Jason Elroy Martis and Sudeepa K B -- Quantum computing and its real-world applications / Pawan Mishra, Ravi Kamal Pandey and Pooja -- Encrypted network traffic classification and application identification employing deep learning / Jyoti Mishra and Mahendra Tiwari…”
    Libro electrónico