Browse Subject Headings
Cyber Warfare, Security and Space Computing : Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22-23, 2024, Proceedings
Cyber Warfare, Security and Space Computing : Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22-23, 2024, Proceedings
Click to enlarge
ISBN No.: 9783031734939
Pages: xv, 372
Year: 202412
Format: Trade Paper
Price: $ 117.29
Dispatch delay: Dispatched between 7 to 15 days
Status: Available (Forthcoming)

- Visvesvarayya Space Lab: preliminary space lab demonstrator.- Hybrid Deep Driven Cross Industry Sentiment Analysis Model for Netizen's Behavioral Characterization.- Fake Product Detection using Blockchain with Encryption and AI.- S-Defender: A Smishing Detection Approach in Mobile Environment.- Mathematical Socio Analysis of Cybercrimes Preparedness A simulation Odessey with R.- Revolutionizing Weather Forecasting: Harnessing Machine Learning and Big Data in Upcoming Technologies.- Trends in Drowsiness Detection & Analysis of the Different Technologies Engaged.- Detecting Local Software Issues Using NSGA Multi-Optimization.


- Deep Learning and IoT Based Robotics to Monitor the Traffic.- Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain Family.- Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device.- Development of Elliptical Cryptography Technique to Watermark Embedded and extrusion for Healthcare Records. -Step-by-Step Image Encryption Using Uaci and Pixadpt.- Investigation of Post - Quantum Cryptography to Secure the Functionality of Vehicle Hardware Architecture.- Secure Data Management Using BlockChain.- Navigating through Digital Realm: Role of Cyberpsychology in Fostering Mental Well-being & Digital Empathy.


- An Empirical Analysis of Neighborhood-based Approaches for Trustworthy Recommendations with Apache Mahout.- Multilingual Sentiment Analysis over Real-time Voice.- Identity Verification: A Decentralized KYC Approach Using Blockchain.- A Neural Network-based Facial Expressions Detection Technique using CK+ Dataset.- Cyber Security Challenges in Industrial Settings with the Internet of Things.- Designing Secure Software-Defined Network, Resistant to DDoS Attack Using Non-Linear Routing Rule Installation.- NPQuant: A Robust Quantum Inspired Computation Algorithms as an efficient solution to NP-Complete Problems.- Impact of Sentiment Analysis in E-Commerce and Cybersecurity.


- Cultivating Cyber Vigilance: Shaping Employee Behavior for Security Success .- A Deep Learning Approach to PDF Malware Detection Enhanced with XAI.- Optimized Deep Learning Technique for the Effective Detection of Windows PE malware.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings