1
Joshi, Amit
2023
Table of Contents:
“...Chapter 1. Implementation of Tweet Stream Summarization for Malicious Tweet Detection -- Chapter 2. Comparative Analysis of A Secure Authentication Protocol For 5g Enabled IoT Network Using Public and Shared Secret Key -- Chapter 3. DDOS Botnet Attack...”2023
Full text
2
Yang, Haomiao
2023
Table of Contents:
“...Introduction -- An Overview of ADS-B -- Basic Techniques for Securing ADS-B Systems -- Enabling Confidentiality for ADS-B Broadcast Messages -- Efficient ADS-B Broadcast -- Authentication with Batch Verification -- Efficient ADS-B Broadcast...”2023
Full text
3
Luo, Wenjian
2023
Table of Contents:
“...Swarm Robotics and UAV A Blockchain-Based Service-Oriented Framework to Enable Cooperation of Swarm Robots -- Collective Behavior for Swarm Robots with Distributed Learning -- Exploration of Underwater Environments with a Swarm of Heterogeneous Surface...”2023
Full text
4
Luo, Wenjian
2023
Table of Contents:
“...Swarm Robotics and UAV A Blockchain-Based Service-Oriented Framework to Enable Cooperation of Swarm Robots -- Collective Behavior for Swarm Robots with Distributed Learning -- Exploration of Underwater Environments with a Swarm of Heterogeneous Surface...”2023
Full text
5
Table of Contents:
“... Voting System -- Chapter 10. AI-Enabled Pregnancy Risk Monitoring and Prediction: A Review -- Chapter 11. Finger Knuckle Print Recognition using Complex Conjugate Feature Vector -- Part IV. Bigdata and Technology -- Chapter 12. What Your Tweets Say about You...”
Full text
Full text
6
7
8