181
182
183
184
Fortino, Giancarlo
2023
Table of Contents:
“... Control in Hybrid Microgrid -- Alteration Approach for Data Cryptography Based on Grigorchuk's Group Rules to Data Mining Objective with Cloud Computing -- Review of Deep-learning based User-identification by Typing Behavior -- COMPARISON OF DIFFERENT CLOUD...”2023
Full text
185
186
187
188
189
Agrawal, Rajeev
2023
Table of Contents:
“...A Review of State of Art Techniques for 3D Human Activity Recognition System -- Comparative Analysis for Email Spam Detection Using Machine Learning Algorithms -- Post Quantum Cryptography: A Solution to the Challenges of Classical Encryption Algorithms...”2023
Full text
190
191
192
193
Ortega, José Manuel
2023
Table of Contents:
“..., and Browsers -- 13. Python Tools for Brute-Force Attacks -- 14. Cryptography and Code Obfuscation -- 15. Assessments - Answers to the End-of-Chapter Questions -- Other Books You May Enjoy -- Index....”2023
Full text
194
195
196
Bahri, Tameem
2023
Table of Contents:
“... Journey as a CTA -- Chapter 2: Core Architectural Concepts: Data Life Cycle -- Chapter 3: Core Architectural Concepts: Integration and Cryptography -- Chapter 4: Core Architectural Concepts: Identity and Access Management -- Chapter 5: Developing a Scalable...”2023
Full text
197
198
199
Arya, Karm Veer
2023
Table of Contents:
“...Post Quantum Cryptography Algorithms: A Review and Applications -- Performance analysis of Hetero-Dielectric Buried Oxide Double Gate Vertical TFET -- Biodigester application to generate electricity and im-prove the quality of life -- Design & Analysis...”2023
Full text