Soft computing for security applications : proceedings of ICSCS 2022 / edited by G. Ranganathan, Xavier Fernando, Selwyn Piramuthu.
2023
QA76.9.S63 I58 2022eb
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Soft computing for security applications : proceedings of ICSCS 2022 / edited by G. Ranganathan, Xavier Fernando, Selwyn Piramuthu.
Meeting Name
International Conference on Soft Computing for Security Applications (2022 : Tamil Nadu, India)
ISBN
9789811935909 (electronic bk.)
9811935904 (electronic bk.)
9789811935893
9811935890
9811935904 (electronic bk.)
9789811935893
9811935890
Published
Singapore : Springer, [2023]
Language
English
Description
1 online resource : illustrations (black and white, and color).
Item Number
10.1007/978-981-19-3590-9 doi
Call Number
QA76.9.S63 I58 2022eb
Dewey Decimal Classification
006.3
Summary
This book features selected papers from the International Conference on Soft Computing for Security Applications (ICSCS 2022), held at Dhirajlal Gandhi College of Technology, Tamil Nadu, India, during April 2122, 2022. It covers recent advances in the field of soft computing techniques such as fuzzy logic, neural network, support vector machines, evolutionary computation, machine learning and probabilistic reasoning to solve various real-time challenges. This book presents innovative work by leading academics, researchers, and experts from industry.
Note
Selected conference papers.
Includes author index.
Includes author index.
Bibliography, etc. Note
References -- Prediction of Students Programming Performance Using Naïve Bayesian and Decision Tree -- 1 Introduction -- 2 Related Works -- 3 Background -- 3.1 Naïve Bayes -- 3.2 Decision Tree -- 4 Experiment and Result -- 4.1 Data Collection -- 4.2 Preprocessing -- 4.3 Classification -- 4.4 Post-processing -- 5 Conclusion and Future Work -- References -- The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures -- 1 Introduction -- 2 Attack Forms -- 3 Network Security Technologies -- 4 Advanced Security Policies for Networks -- 5 Conclusion
References
References
Access Note
Access limited to authorized users.
Source of Description
Description based on print version record.
Added Corporate Author
Dhirajlal Gandhi College of Technology, host institution.
Series
Advances in intelligent systems and computing ; 1428.
Available in Other Form
Soft computing for security applications.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Smart Question Paper Evaluation: Automated Approach Using the Jaccard Similarity
Smart Patterns: Searching a Pattern in the Unknown Environment Using Hybrid Framework
Image Processing Techniques for PCB Board Fault Analysis with Object Extraction and Measurements
Gamification of Knowledge Management System: A Framework to Incentivize Knowledge Sharing for the Software Industry
Privacy Attributes Aware Framework in Information Disclosure Models for Public During Pandemic.
Smart Patterns: Searching a Pattern in the Unknown Environment Using Hybrid Framework
Image Processing Techniques for PCB Board Fault Analysis with Object Extraction and Measurements
Gamification of Knowledge Management System: A Framework to Incentivize Knowledge Sharing for the Software Industry
Privacy Attributes Aware Framework in Information Disclosure Models for Public During Pandemic.