000 | 03623nam a22005895i 4500 | ||
---|---|---|---|
999 |
_c200457499 _d75711 |
||
003 | TR-AnTOB | ||
005 | 20231115170102.0 | ||
007 | cr nn 008mamaa | ||
008 | 220514s2022 si | s |||| 0|eng d | ||
020 | _a9789811686641 | ||
024 | 7 |
_a10.1007/978-981-16-8664-1 _2doi |
|
040 |
_aTR-AnTOB _beng _erda _cTR-AnTOB |
||
041 | _aeng | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
090 | _aQA76.9.A25EBK | ||
245 | 1 | 0 |
_aCyber Security, Privacy and Networking _h[electronic resource] : _bProceedings of ICSPN 2021 / _cedited by Dharma P. Agrawal, Nadia Nedjah, B. B. Gupta, Gregorio Martinez Perez. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Networks and Systems, _x2367-3389 ; _v370 |
|
505 | 0 | _aA New Modified MD5-224 bits Hash Function and an Efficient Message Authentication Code Based on Quasigroups -- Leveraging Transfer Learning for Effective Recognition of Emotions from Images: A Review -- An Automated System for Facial Mask Detection and Face Recognition during COVID - 19 Pandemic -- ROS Simulation Based Autonomous Navigation Systems & Object Detection -- Robotic Assistant for Medicine and Food Delivery in Healthcare. | |
520 | _aThis book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems. | ||
650 | 0 | _aTelecommunication. | |
650 | 0 | _aComputer networks—Security measures. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData protection—Law and legislation. | |
650 | 1 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aPrivacy. |
653 | 0 | _aComputer security -- Congresses | |
653 | 0 | _aComputer networks -- Access control -- Congresses | |
700 | 1 |
_aAgrawal, Dharma P. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aNedjah, Nadia. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGupta, B. B. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMartinez Perez, Gregorio. _eeditor. _0(orcid)0000-0001-5532-6604 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
830 | 0 |
_aLecture Notes in Networks and Systems, _x2367-3389 ; _v370 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-981-16-8664-1 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |