{"title":"Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona","authors":"Muhammad Talha Saleem, Noor Ul-Ain, Zartaj Tahir","doi":"10.1201/9780367808228-12","DOIUrl":"https://doi.org/10.1201/9780367808228-12","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ravishanker, Monica Sood, P. Angra, Sahil Verma, Kavita, Noor Zaman Jhanjhi
{"title":"Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks","authors":"Ravishanker, Monica Sood, P. Angra, Sahil Verma, Kavita, Noor Zaman Jhanjhi","doi":"10.1201/9780367808228-6","DOIUrl":"https://doi.org/10.1201/9780367808228-6","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123073318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sujatha, J. Gitanjali, R. P. Kumar, Mustansar Ali, Ghazanfar, Baibhav Pathy, J. Chatterjee
{"title":"Automatic Street Light Control Based on Pedestrian and Automobile Detection","authors":"R. Sujatha, J. Gitanjali, R. P. Kumar, Mustansar Ali, Ghazanfar, Baibhav Pathy, J. Chatterjee","doi":"10.1201/9780367808228-11","DOIUrl":"https://doi.org/10.1201/9780367808228-11","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khurram Shahzad, Hasnat Ahmed, F. Ahsan, Khalid Hussain, M. N. Talib
{"title":"Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID","authors":"Khurram Shahzad, Hasnat Ahmed, F. Ahsan, Khalid Hussain, M. N. Talib","doi":"10.1201/9780367808228-13","DOIUrl":"https://doi.org/10.1201/9780367808228-13","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rakhi Seth, Aakanksha Sharaff, J. Chatterjee, Noor Zaman Jhanjhi
{"title":"Ransomware Attack: Threats & Different Detection Technique","authors":"Rakhi Seth, Aakanksha Sharaff, J. Chatterjee, Noor Zaman Jhanjhi","doi":"10.1201/9780367808228-9","DOIUrl":"https://doi.org/10.1201/9780367808228-9","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"30 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shehneela Khan, Tariq Ali, U. Draz, S. Yasin, M. Khan, Amjad Ali
{"title":"Prevention of DOS/DDOS Attacks Through Expert Honey Mesh Security Infrastructure","authors":"Shehneela Khan, Tariq Ali, U. Draz, S. Yasin, M. Khan, Amjad Ali","doi":"10.1201/9780367808228-5","DOIUrl":"https://doi.org/10.1201/9780367808228-5","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}