標(biāo)題: Titlebook: Security, Privacy and Data Analytics; Select Proceedings o Udai Pratap Rao,Mamoun Alazab,Pethuru Raj Chelliah Conference proceedings 2023 T [打印本頁(yè)] 作者: STH 時(shí)間: 2025-3-21 17:37
書(shū)目名稱Security, Privacy and Data Analytics影響因子(影響力)
書(shū)目名稱Security, Privacy and Data Analytics影響因子(影響力)學(xué)科排名
書(shū)目名稱Security, Privacy and Data Analytics網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Security, Privacy and Data Analytics網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Security, Privacy and Data Analytics被引頻次
書(shū)目名稱Security, Privacy and Data Analytics被引頻次學(xué)科排名
書(shū)目名稱Security, Privacy and Data Analytics年度引用
書(shū)目名稱Security, Privacy and Data Analytics年度引用學(xué)科排名
書(shū)目名稱Security, Privacy and Data Analytics讀者反饋
書(shū)目名稱Security, Privacy and Data Analytics讀者反饋學(xué)科排名
作者: 拋棄的貨物 時(shí)間: 2025-3-21 21:22
,Recent Advancements on Energy-Saving LEACH Protocol in Wireless Sensor Network—Review,proving the LEACH algorithm and creating more efficiency for practical use. The main issues of LEACH inequality of the amount of CHs and forgetting to unused energy of nodes. That’s why researchers find the solution to propose a new energy-efficient routing protocol, or enhance the existing routing 作者: nonradioactive 時(shí)間: 2025-3-22 01:59
Analysis of Different Sampling Techniques for Software Fault Prediction,vations. Different over-sampling and under-sampling techniques are used to tackle the class imbalance problem. In this paper, random under-sampling, random over-sampling, and SMOTE are applied to six PROMISE datasets. A decision tree classifier is used to create the model. The efficiency of differen作者: apiary 時(shí)間: 2025-3-22 05:34 作者: ornithology 時(shí)間: 2025-3-22 09:25 作者: garrulous 時(shí)間: 2025-3-22 12:53 作者: Gyrate 時(shí)間: 2025-3-22 18:39 作者: 尖酸一點(diǎn) 時(shí)間: 2025-3-22 22:42 作者: Seizure 時(shí)間: 2025-3-23 02:41
Malicious Sensor Node Extraction from Infested Acoustic Signals in Underwater Wireless Sensor Netwoo standard techniques. It is found that the proposed method performs superior to the state of the art by at least 24.4% in terms of delta ., whereas it is 3% in the vicinity of the lower bound in terms of localization accuracy. The advantage of the proposed research is achieved in terms of the remov作者: Geyser 時(shí)間: 2025-3-23 09:30
Stock Market Prediction and Analysis Using Different Machine Learning Algorithms,e proposed algorithm is around 97%. Different types of datasets are utilised to achieve favourable outcomes. It can be observed that building a proper model can help an investor to create a better stock portfolio, as better prediction improves the net profit for the investor.作者: 不能仁慈 時(shí)間: 2025-3-23 13:09
,A Novel Fake Job Posting Detection: An Empirical Study and?Performance Evaluation Using ML and?Ensec. We compared the performance of ensemble techniques with machine learning (ML) algorithms on publicly available EMSCAD dataset using accuracy and F1-score. Bagging classifier outperformed all the models with an accuracy of 98.85% and an F1-score of 0.88 on imbalanced dataset. On balanced dataset, 作者: outer-ear 時(shí)間: 2025-3-23 14:46 作者: Commentary 時(shí)間: 2025-3-23 18:20 作者: ONYM 時(shí)間: 2025-3-24 02:15
Harshal Shridhar Kallurkar,B. R. Chandavarkartical science literature. The literature is limited to several accounts by former OECD staff on the OECD’s development work, which although an informative and essential source of information is outdated and partly apologetic;. and to several articles or book chapters from political science authors o作者: N斯巴達(dá)人 時(shí)間: 2025-3-24 06:22
Sarra Hammouti,Belabbas Yagoubi,Sid Ahmed Makhloufn expert commission, headed by Columbia University economist Jeffrey Sachs, with developing a concrete action plan that would spell out how these goals could be achieved. Published in 2005, the plan announced a new “era in international development” and, with its hundreds of proposals, left no doubt作者: 滑動(dòng) 時(shí)間: 2025-3-24 07:41 作者: ALOFT 時(shí)間: 2025-3-24 13:12 作者: Abutment 時(shí)間: 2025-3-24 17:27 作者: homocysteine 時(shí)間: 2025-3-24 20:03
Naman Rohilla,Yogesh Goyal,Ajay Khasiya,Bhavesh N. Gohil,A. K. Shuklance of these two conflicting discourses has led to contestation, but also to exchange and cooperation. We furthermore outline to what extent the two discourses have changed over time. We conclude the chapter with a discussion of future challenges for the global governance of labor standards.作者: AVID 時(shí)間: 2025-3-25 02:41
Cheekati Srikanth,M. Rashmi,S. Ramu,Ram Mohana Reddy Guddetince of these two conflicting discourses has led to contestation, but also to exchange and cooperation. We furthermore outline to what extent the two discourses have changed over time. We conclude the chapter with a discussion of future challenges for the global governance of labor standards.作者: BLAZE 時(shí)間: 2025-3-25 03:47
Rohitkumar Jigalur,Chirag Modiational norms and measures surrounding children’s rights continue to be challenged and questioned by scholars and practitioners alike. Furthermore, the analysis of children’s rights provides opportunities to reconsider traditional approaches to global social policy.作者: 領(lǐng)導(dǎo)權(quán) 時(shí)間: 2025-3-25 09:30 作者: 有權(quán) 時(shí)間: 2025-3-25 13:46
A. Vamshi,R. Eswari,Shivam Dubey interest rate differential (the actual forward rate is equal to its interest parity rate). Once equality is reached, any opportunity for arbitrage profit will be eliminated; consequently, the tendency for the movement of funds in either direction will disappear.作者: 繞著哥哥問(wèn) 時(shí)間: 2025-3-25 19:32
Harshit Garg,Mradul Tiwari,Mehul Rawal,Kaustubh Gupta,Ranvijay,Mainejar Yadav作者: calamity 時(shí)間: 2025-3-25 21:24
Suryabhan Singh,Kirti Sharma,Brijesh Kumar Karna,Pethuru Raj作者: antiquated 時(shí)間: 2025-3-26 01:52
Jyoti Madake,Akshay Vyas,Vaibhav Pawale,Vibha Chaudhary,Shripad Bhatlawande,Swati Shilaskar作者: Barrister 時(shí)間: 2025-3-26 05:10 作者: 積極詞匯 時(shí)間: 2025-3-26 09:10
Lecture Notes in Electrical Engineeringhttp://image.papertrans.cn/s/image/863631.jpg作者: FOR 時(shí)間: 2025-3-26 14:14 作者: 釋放 時(shí)間: 2025-3-26 18:44
978-981-99-3571-0The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: FLAIL 時(shí)間: 2025-3-26 21:28
Security, Privacy and Data Analytics978-981-99-3569-7Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: LIMN 時(shí)間: 2025-3-27 05:05 作者: appall 時(shí)間: 2025-3-27 09:14 作者: SCORE 時(shí)間: 2025-3-27 12:02 作者: 百科全書(shū) 時(shí)間: 2025-3-27 13:42
Slow TCP Port Scan Detection Using Flow Data,tropy values of flow parameters. The detection capability of the system is evaluated using two benchmark datasets. The result obtained shows that the flow data can be used to detect slow scan attacks effectively.作者: exquisite 時(shí)間: 2025-3-27 18:48 作者: 卵石 時(shí)間: 2025-3-27 22:05 作者: Deduct 時(shí)間: 2025-3-28 04:25
Vision-Based Weather Condition Recognition for Driver Assistance,e Gray-Level Co-occurrence Matrix technique was used to collect weather-related attributes, and the necessary data processing was done. The system achieves a weather forecast accuracy of roughly 89.86%.作者: DALLY 時(shí)間: 2025-3-28 06:45 作者: 金盤(pán)是高原 時(shí)間: 2025-3-28 11:11
,Secured Workflow Scheduling Techniques in?Cloud: A Survey, research works that investigate the mentioned problem. Additionally, we highlight and discuss limitations, gaps and problem aspects that are not sufficiently investigated in the literature, as well as future research challenges.作者: hyperuricemia 時(shí)間: 2025-3-28 14:46
Conference proceedings 2023 across industry and academia working in security, privacy, and data analytics from technological and social perspectives. This book will emerge as a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners across the globe..作者: Confound 時(shí)間: 2025-3-28 22:46
Conference proceedings 2023cs, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and many others. The volume includes novel contributions and the latest developments from researchers作者: 植物學(xué) 時(shí)間: 2025-3-29 02:44
,Recent Advancements on Energy-Saving LEACH Protocol in Wireless Sensor Network—Review,WSN) has a popular choice for researchers to implement energy-efficient routing techniques. WSN is using energy-efficient routing protocols to decrease sensor node energy and improve network lifetime. Clustering is the best approach to consume less power and enhances speed. Researchers worked on an 作者: Demonstrate 時(shí)間: 2025-3-29 04:16 作者: 長(zhǎng)處 時(shí)間: 2025-3-29 10:52
An Exploration of Digital Image Forensic Techniques: A Brief Survey,its quality or to intentionally change its meaning it is very difficult to conclude if an image is forged or is genuine. In this paper, three important aspects of image forgery detection are explored. An in-depth discussion of image forgery detection, a technique which is based on assessing image fe作者: exhilaration 時(shí)間: 2025-3-29 11:37 作者: flutter 時(shí)間: 2025-3-29 19:24
Analysis of Different Sampling Techniques for Software Fault Prediction,predicted in prior stages help in the management of resources and time required during software testing and maintenance. Over the years, various supervised machine learning-based techniques for fault prediction have been suggested. The models are trained using a labeled dataset that consists of mult作者: Feature 時(shí)間: 2025-3-29 23:01 作者: 干涉 時(shí)間: 2025-3-30 01:00
,Secured Workflow Scheduling Techniques in?Cloud: A Survey,s one of the most important user concerns, researchers were constantly looking for the most efficient techniques to solve the problem while taking into account the security and privacy of data and tasks. Thus we introduce in this paper, a literature review, taxonomy and comprehensive analysis of the作者: 破譯密碼 時(shí)間: 2025-3-30 04:34 作者: conifer 時(shí)間: 2025-3-30 09:20
AuthBlock: Authentication Framework Using Ethereum Blockchain,aring of user data without their consent, password stealing on a large scale, etc. By decentralizing ownership of credentials and providing a framework for confirming one’s record in an unalterable chain of data, i.e., Distributed Ledger Technology (DLT) in general and blockchain can provide a solut作者: 保守黨 時(shí)間: 2025-3-30 13:28
Vision-Based Driver Assistance System to Detect Mountainous Roads Using GLCM and Haralick Texture F a computationally efficient computer vision and machine learning-based approach to detect these roads. The dataset includes damaged, steep, and narrow mountainous roadways. The Field of View (FoV) creation step in preprocessing increased the algorithm’s accuracy. The five statistical texture parame作者: 摻和 時(shí)間: 2025-3-30 18:56
Vision-Based Weather Condition Recognition for Driver Assistance,s. The decreased scene visibility in unfavorable weather conditions (fog/rain) is one of the issues that drivers experience while driving. The contrast and color of acquired photographs are poor in hazy weather circumstances, making it difficult to discern the image. A technique to separate images o作者: 災(zāi)難 時(shí)間: 2025-3-31 00:31
Vision-Based Distracted Driver Detection Using a Fusion of SIFT and ORB Feature Extraction,f these crashes end in fatalities. In this study, we are using computer vision with machine learning, to provide a unique technique to determine whether a car driver is driving the car safely or not. In this study, two feature extraction approaches SIFT and ORB were implemented, with an emphasis on 作者: Pruritus 時(shí)間: 2025-3-31 04:19 作者: 船員 時(shí)間: 2025-3-31 06:02 作者: itinerary 時(shí)間: 2025-3-31 11:08 作者: 薄荷醇 時(shí)間: 2025-3-31 15:34
,A Novel Fake Job Posting Detection: An Empirical Study and?Performance Evaluation Using ML and?Enseers to scam people online and acquire easy money. Numerous cyber crimes worldwide exist, including identity theft and fake job postings. Nowadays, many companies post job openings online, making recruitment simple. Consequently, fraudsters also post job openings online to obtain money and personal i作者: MURAL 時(shí)間: 2025-3-31 18:28 作者: 致詞 時(shí)間: 2025-4-1 00:04
,Machine Learning-Based Malware Detection and?Classification in?Encrypted TLS Traffic,ecurity. As a result, network security measures play an important role in countering these cyber threats. Existing malware detection techniques are unable to detect them effectively. A novel Ensemble Machine Learning (ML)-based malware detection technique from Transport Layer Security (TLS)-encrypte作者: pacific 時(shí)間: 2025-4-1 05:32 作者: Benign 時(shí)間: 2025-4-1 09:29 作者: Anonymous 時(shí)間: 2025-4-1 13:40
Sarra Hammouti,Belabbas Yagoubi,Sid Ahmed Makhloufe twenty-first century’s world. In a declaration that became known as the “United Nations Millennium Declaration,” they outlined the following goals: By 2015, the global community was to halve “the proportion of the world’s people whose income is less than one dollar a day and the proportion of peop作者: 注視 時(shí)間: 2025-4-1 18:15 作者: mighty 時(shí)間: 2025-4-1 19:13 作者: infinite 時(shí)間: 2025-4-2 00:15
Prateek,Rajeev Aryaur, approach the global governance of labor standards. Defining ‘labor standards’ is notoriously difficult. We therefore use Freedom of Association and Collective Bargaining (FACB) rights as a benchmark to assess the positions taken by the five regional organizations. We argue that two main discours作者: Intercept 時(shí)間: 2025-4-2 06:07 作者: 性上癮 時(shí)間: 2025-4-2 09:20
Cheekati Srikanth,M. Rashmi,S. Ramu,Ram Mohana Reddy Guddetiur, approach the global governance of labor standards. Defining ‘labor standards’ is notoriously difficult. We therefore use Freedom of Association and Collective Bargaining (FACB) rights as a benchmark to assess the positions taken by the five regional organizations. We argue that two main discours