Proceeding Book of the International Conference on Cyber Security and Computer Science (ICONCS 2018) : 18-20 October 2018 /Safranbolu, Turkey / editors Prof. Dr. Touhid Bhuıyan Asst. Prof. Dr. Muhammet Tahir Güneşer Asst. Prof. Dr. Yüksel Çelik Asst. Prof. Dr. Zafer Albayrak Res. Asst. Idris Kahraman Res. Asst. Kadir Ileri Res. Asst. Mahmut Selman Gökmen.
Yayıncı: Karabük : Karabük Üniversitesi, 2018Tanım: 1 online resource (235 p. ill.)İçerik türü:- text
- computer
- online resource
- 9786059554329
- E-KITAP
| Materyal türü | Ana kütüphane | Koleksiyon | Yer numarası | Durum | İade tarihi | Barkod | Materyal Ayırtmaları | |
|---|---|---|---|---|---|---|---|---|
Elektronik Kitap
|
Mehmet Akif Ersoy Merkez Kütüphanesi Dijital içerik | Non-fiction | E-KİTAP (Rafa gözat(Aşağıda açılır)) | Çevrimiçi Kaynak | EK733 |
Includes bibliographical references.
Table of Contents An online-tool for tuning ensemble learning algorithms 1 The Management and Configuration System for Low Cost Portable Crypto Device in an Embedded System 6 112 Emergency Call Positioning Message Support Application for Smart Phones 9 Confidential Data Transport In Noise Image 12 A hybrid cloud-based Intrusion Detection and Response System (IDRS) based on Grey Wolf Optimizer (GWO) and Neural Network (NN) 17 An investigation on factors influencing wearable device adoption: A partial least squares approach 22 Quantitative Assessment on Broken Access Control Vulnerability in Web Applications 26 A comparison of some soft computing methods on Imbalanced data 33 A hybrid intrusion detection system based on Sine Cosine Algorithm and Naïve Bayes algorithm 38 Trend Estimation of Stock Market: An Intelligent Decision System 44 A Study on Remote Code Execution Vulnerability in Web Applications 50 A New Algorithm for the Colored Image Encryption via the Modified Chua’s Circuit 58 Implementation of GOST 28147-89 Encryption and Decryption Algorithm on FPGA 67 A Method Based on Particle Swarm Optimization for Finding Optimum Opacity Transfer Function 71 Information Security Risk Management and Risk Assessment Methodology and Tools 73 An Analysis of the Current State of Security in the Internet of Things 79 A WildCAT Based Observable Bayesian Student Model 86 Composite ElGamal Cryptosystem and An Application of The Cryptosystem to Asymmetric Cryptography 92 Differences between Free Open Source and Commercial Sandboxes 95 An Analysis of DRDoS Amplifiers in Europe 99 An Ontology-based Approach to Terminology Management for Healthcare Systems 104 Big Data Applications: A Review 108 Anomaly-Based Detection of Non-Recursive HTTP GET Flood DDoS Attack 112 Gait Recognition via Machine Learning 119 How to Assess Security and Efficiency of Authenticated Encryption Algorithms 124 The Interaction Of Infants With The Television, Smart Phone And Tablet Computers 130 Classification Bhp Flooding Attack In Obs Network With Data Mining Techniques 134 An investigation on factors influencing smart watch adoption: A partial least squares approach 138 Comparing Common Supervised Machine Learning Algorithms For Twitter Spam Detection in Scikit Learn. 142 A Numerical Algorithm for the Analysis of the Thermal Stress-Stain State of a Rod 146 Comparison of Cryptography Algorithms for Mobile Payment Systems 150 Classification of Tweets about Violence against Women. 156 Algorithms for Runtime Generation of Homogeneous Classes of Objects 160 Short-Term Load Forecasting by Knowledge Based Systems on the basis of Priority Index for Selection of Similar Days 165 A Review: Active Queue Management Algorithms in Mobile Communication 171 An inventive method for eco-efficient operation of home energy management system 176 A New Entropy-based Feature Selection Method for Load Forecasting in Smart Homes 185 Big Data Analytics for Load Forecasting in Smart Grids: A Survey. 193 Fog as-a-Power Economy Sharing Service. 203 The Development of Information System of Formation and Use of Information Resources For Evaluation of Parameters and Evaluation af Recommendations Based On Big Data Technology Tools: Work With Mongodb 208 Vertical Search Engine for Academic Publications. 212 Optimum unit sizing of a stand-alone hybrid PV-WT-FC system using Jaya algorithm 216 Optimal Foraging Algorithm (OFA) for Solving Constrained Optimization Problems 223 Performance Evaluation of 28 and 73 GHz Ultra High Frequency Bands for Outdoor MIMO 227 Hash Equations and Cryptographic Applications on Forensic. 233
Bu materyal hakkında henüz bir yorum yapılmamış.
-baunlogo.png?alt=media&token=2b1f50b7-298a-48ee-a2b1-6fcf8e70b387)