語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber security and digital forensics = select proceedings of the 2nd International Conference, ReDCySec 2024 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber security and digital forensics/ edited by Nihar Ranjan Roy ... [et al.].
其他題名:
select proceedings of the 2nd International Conference, ReDCySec 2024 /
其他題名:
ReDCySec 2024
其他作者:
Roy, Nihar Ranjan.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
viii, 492 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-3284-8
ISBN:
9789819632848
Cyber security and digital forensics = select proceedings of the 2nd International Conference, ReDCySec 2024 /
Cyber security and digital forensics
select proceedings of the 2nd International Conference, ReDCySec 2024 /[electronic resource] :ReDCySec 2024edited by Nihar Ranjan Roy ... [et al.]. - Singapore :Springer Nature Singapore :2025. - viii, 492 p. :ill., digital ;24 cm. - Lecture notes in networks and systems,v. 12872367-3389 ;. - Lecture notes in networks and systems ;v.1..
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats -- Impact of Mobile Node Power Consumption in different Mobility Models on Security -- Cyber Resilience Based Education System -- Enhancing Patient Access and Security: Blockchain-QR Integrated Hospital On Tap System -- Adapting GDPR to the Indian Context - Challenges and Implementation Framework -- Leveraging Machine Learning Algorithms for Enhanced Network Intrusion Detection and Categorization (NIDC) -- A security model for the enhancement of mobile security.
This book features peer-reviewed papers from the International Conference on Recent Developments in Cyber Security, organized by the Center for Cyber Security and Cryptology. It focuses on key topics such as information privacy and secrecy, cryptography, cyber threat intelligence and mitigation, cyber-physical systems, quantum cryptography, and blockchain technologies and their applications. This volume is a unique collection of chapters from various disciplines united by a common theme, making it immensely valuable for both academic researchers and industry practitioners.
ISBN: 9789819632848
Standard No.: 10.1007/978-981-96-3284-8doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyber security and digital forensics = select proceedings of the 2nd International Conference, ReDCySec 2024 /
LDR
:02326nam a2200373 a 4500
001
1166401
003
DE-He213
005
20250824130151.0
006
m d
007
cr nn 008maaau
008
251217s2025 si s 0 eng d
020
$a
9789819632848
$q
(electronic bk.)
020
$a
9789819632831
$q
(paper)
024
7
$a
10.1007/978-981-96-3284-8
$2
doi
035
$a
978-981-96-3284-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Cyber security and digital forensics
$h
[electronic resource] :
$b
select proceedings of the 2nd International Conference, ReDCySec 2024 /
$c
edited by Nihar Ranjan Roy ... [et al.].
246
3
$a
ReDCySec 2024
260
$a
Singapore :
$c
2025.
$b
Springer Nature Singapore :
$b
Imprint: Springer,
300
$a
viii, 492 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
v. 1287
505
0
$a
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats -- Impact of Mobile Node Power Consumption in different Mobility Models on Security -- Cyber Resilience Based Education System -- Enhancing Patient Access and Security: Blockchain-QR Integrated Hospital On Tap System -- Adapting GDPR to the Indian Context - Challenges and Implementation Framework -- Leveraging Machine Learning Algorithms for Enhanced Network Intrusion Detection and Categorization (NIDC) -- A security model for the enhancement of mobile security.
520
$a
This book features peer-reviewed papers from the International Conference on Recent Developments in Cyber Security, organized by the Center for Cyber Security and Cryptology. It focuses on key topics such as information privacy and secrecy, cryptography, cyber threat intelligence and mitigation, cyber-physical systems, quantum cryptography, and blockchain technologies and their applications. This volume is a unique collection of chapters from various disciplines united by a common theme, making it immensely valuable for both academic researchers and industry practitioners.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Digital forensic science
$v
Congresses.
$3
1431268
650
1 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Forensic Science.
$3
683486
700
1
$a
Roy, Nihar Ranjan.
$3
1201728
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.1.
$3
1107910
856
4 0
$u
https://doi.org/10.1007/978-981-96-3284-8
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入