Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Imprint: Springer
    ISBN: 9783030921668
    Language: English
    Pages: 1 Online-Ressource(XIV, 235 p. 134 illus., 94 illus. in color.)
    Edition: 1st ed. 2022.
    Series Statement: Studies in Big Data 102
    Parallel Title: Erscheint auch als Cybersecurity
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Engineering—Data processing. ; Control engineering. ; Dynamics. ; Nonlinear theories. ; Cooperating objects (Computer systems). ; Big data. ; Computational intelligence.
    Abstract: A novel approach for robust S-box construction using a 5-D chaotic map and its application to image cryptosystem -- An image compression-encryption algorithm based on compressed sensing and chaotic oscillator -- Backstepping and sliding mode control of a fractional-order chaotic system -- Quantum oscillations: A promising field for secure communication -- Synchronization of chaotic electroencephalography (EEG) signals -- Secure Communication Scheme Based on Hyperchaotic Systems.
    Abstract: This book presents techniques and security challenges of chaotic systems and their use in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems and methods and proposes new models, practical solutions, and technological advances related to new chaotic dynamical systems. The book can be used as part of the bibliography of the following courses: - Cybersecurity - Cryptography - Networks and Communications Security - Nonlinear Circuits - Nonlinear Systems and Applications.
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783030854287
    Language: English
    Pages: 1 Online-Ressource(XI, 278 p. 101 illus., 76 illus. in color.)
    Edition: 1st ed. 2022.
    Series Statement: Studies in Big Data 95
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Engineering—Data processing. ; Cooperating objects (Computer systems). ; Computational intelligence. ; Big data.
    Abstract: Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks -- Data Security Challenges in Deep Neural Network for Healthcare IoT Systems -- Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio -- A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals -- Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems -- Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches.
    Abstract: This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks. .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...