Security analytics : a data centric approach to information security /: a data centric approach to information security. (2022)
- Record Type:
- Book
- Title:
- Security analytics : a data centric approach to information security /: a data centric approach to information security. (2022)
- Main Title:
- Security analytics : a data centric approach to information security
- Further Information:
- Note: Edited by Mehak Khurana, Shilpa Mahajan.
- Editors:
- Khurana, Mehak
Mahajan, Shilpa - Contents:
- Preface............................................................................................................................................. vii; Editors................................................................................................................................................ix; Contributors.....................................................................................................................................xi 1. A Reliable Blockchain Application for Music in a Decentralized Network ................1 Bhavna Saini, Gaurav Aggarwal, Anju Yadav, and Kabeer Nautiyal 2. An Authentic Data-Centric Application for Medical Stores .........................................15 S. L. Jayalakshmi, R. Girija, and R. Vedhapriyavadhana 3. Intelligent Data-Analytic Approach for Restaurant Recommendation ......................29 Nirmal Kirola, Sandesh Tripathi, Nitin Chhimwal, and Sudhir Sharma 4. Investigation on Mobile Forensics Tools to Decode Cyber Crime ..............................45 Keshav Kaushik 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications ......................................................................................................57 Kannadhasan Suriyan and Nagarajan Ramalingam 6. Optical Encryption of Images Using Partial Pivoting Lower Upper Decomposition Based on Two Structured Deterministic Phase Masks in the Hybrid Transform DomainPreface............................................................................................................................................. vii; Editors................................................................................................................................................ix; Contributors.....................................................................................................................................xi 1. A Reliable Blockchain Application for Music in a Decentralized Network ................1 Bhavna Saini, Gaurav Aggarwal, Anju Yadav, and Kabeer Nautiyal 2. An Authentic Data-Centric Application for Medical Stores .........................................15 S. L. Jayalakshmi, R. Girija, and R. Vedhapriyavadhana 3. Intelligent Data-Analytic Approach for Restaurant Recommendation ......................29 Nirmal Kirola, Sandesh Tripathi, Nitin Chhimwal, and Sudhir Sharma 4. Investigation on Mobile Forensics Tools to Decode Cyber Crime ..............................45 Keshav Kaushik 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications ......................................................................................................57 Kannadhasan Suriyan and Nagarajan Ramalingam 6. Optical Encryption of Images Using Partial Pivoting Lower Upper Decomposition Based on Two Structured Deterministic Phase Masks in the Hybrid Transform Domain ..............................................................73 Priyanka Maan, Hukum Singh, and A. Charan Kumari 7. A Comparative Analysis of Blockchain Integrated IoT Applications .........................93 Seema Verma 8. Blockchain: A New Power-Driven Technology for Smart Cities ...............................109 Shyamal Srivastava and R. Girija 9. Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks Based on Lattice Behavioral Using Spread Spectral Soft-Max-Recurrent Neural Networks ............................................................................123 N. Umamaheshwari and R. Renuga Devi 10. Provably Secure Role Delegation Scheme for Medical Cyber-Physical Systems ..................................................................................................................................143 Rachana Y. Patil and Aparna Bannore 11. FRAME Routing to Handle Security Attacks in Wireless Sensor Networks ...........165 Subramanyam Radha, Bidar Sachin, Seyedali Pourmoafi, and Perattur Nagabushanam 12. A Blockchain Security Management-Based Rehashing Shift Code Rail Encryption Using Circular Shift Round Random Padding Key for Decentralized Cloud Environment ............................................................................191 K. Ganga Devi and R. Renuga Devi 13. Application of Exact Barrier-Penalty Function for Developing Privacy Mechanisms in Cyber-Physical Systems ..........................................................209 Manas Kumar Yogi and Ardhani Satya Narayana Chakravarthy Index ............................................................................................................................221 … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : Chapman & Hall/CRC
- Publication Date:
- 2022
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 005.8
Computer security
System analysis - Languages:
- English
- ISBNs:
- 9781000597561
9781000597547
9781003206088 - Related ISBNs:
- 9781032072418
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.697000
- Ingest File:
- 12_031.xml