001467978 000__ 05273cam\\22006617i\4500 001467978 001__ 1467978 001467978 003__ OCoLC 001467978 005__ 20230707003348.0 001467978 006__ m\\\\\o\\d\\\\\\\\ 001467978 007__ cr\un\nnnunnun 001467978 008__ 230517s2023\\\\si\a\\\\o\\\\\101\0\eng\d 001467978 019__ $$a1379097174 001467978 020__ $$a9789819922642$$q(electronic bk.) 001467978 020__ $$a981992264X$$q(electronic bk.) 001467978 020__ $$z9789819922635 001467978 020__ $$z9819922631 001467978 0247_ $$a10.1007/978-981-99-2264-2$$2doi 001467978 035__ $$aSP(OCoLC)1379249829 001467978 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX 001467978 049__ $$aISEA 001467978 050_4 $$aQA76.9.A25 001467978 08204 $$a005.8$$223/eng/20230517 001467978 1112_ $$aATIS (Conference)$$n(13th :$$d2022 :$$cManipel, India) 001467978 24510 $$aApplications and Techniques in Information Security :$$b13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised selected papers /$$cedited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li, editors. 001467978 2463_ $$aATIS 2022 001467978 264_1 $$aSingapore :$$bSpringer,$$c2023. 001467978 300__ $$a1 online resource (xiii, 304 pages) :$$billustrations (some color). 001467978 336__ $$atext$$btxt$$2rdacontent 001467978 337__ $$acomputer$$bc$$2rdamedia 001467978 338__ $$aonline resource$$bcr$$2rdacarrier 001467978 4901_ $$aCommunications in computer and information science,$$x1865-0937 ;$$v1804 001467978 500__ $$aIncludes author index. 001467978 5050_ $$aPrivacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson's Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach. 001467978 506__ $$aAccess limited to authorized users. 001467978 520__ $$aThis book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30-31, 2022. The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies. 001467978 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 17, 2023). 001467978 650_0 $$aComputer security$$vCongresses. 001467978 650_0 $$aInformation networks$$xSecurity measures$$vCongresses. 001467978 655_0 $$aElectronic books. 001467978 7001_ $$aPrabhu, Srikanth,$$eeditor.$$0(orcid)0000-0002-3826-1084$$1https://orcid.org/0000-0002-3826-1084 001467978 7001_ $$aPokhrel, Shiva Raj,$$eeditor.$$1https://orcid.org/0000-0001-5819-765X 001467978 7001_ $$aLi, Gang$$c(Computer scientist),$$eeditor.$$1https://orcid.org/0000-0003-1583-641X 001467978 77608 $$iPrint version: $$z9819922631$$z9789819922635$$w(OCoLC)1373928922 001467978 830_0 $$aCommunications in computer and information science ;$$v1804.$$x1865-0937 001467978 852__ $$bebk 001467978 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-99-2264-2$$zOnline Access$$91397441.1 001467978 909CO $$ooai:library.usi.edu:1467978$$pGLOBAL_SET 001467978 980__ $$aBIB 001467978 980__ $$aEBOOK 001467978 982__ $$aEbook 001467978 983__ $$aOnline 001467978 994__ $$a92$$bISE