Rising threats in expert applications and solutions : proceedings of FICR-TEAS 2020

Bibliographische Detailangaben

Titel
Rising threats in expert applications and solutions proceedings of FICR-TEAS 2020
verantwortlich
Rathore, Vijay Singh.; Dey, Nilanjan.; Piuri, Vincenzo.; Babo, Rosalina.; Polkowski, Zdzislaw.; Tavares, João Manuel R. S.; FICR-TEAS (Conference) (1st : 2020 : Jaipur, India)
Schriftenreihe
Advances in intelligent systems and computing ; v. 1187
veröffentlicht
Singapore: Springer, 2020
©2021
Erscheinungsjahr
2020
Teil von
Advances in intelligent systems and computing ; ; 1187.
Medientyp
E-Book
Datenquelle
British National Bibliography
Tags
Tag hinzufügen

Zugang

Für diesen Titel können wir derzeit leider keine weiteren Informationen zur Verfügbarkeit bereitstellen.

LEADER 04945aam a22005531i 4500
001 180-019974554
003 Uk
005 20201221170041.0
006 m || d |
007 cr |||||||||||
008 201005s2020 si |||||o |||| ||eng
015 |a GBC0K0469  |2 bnb 
020 |a 9789811560149  |q Electronic book (EPUB format) 
020 |z 9789811560132  |q print 
037 |a com.springer.onix.9789811560149  |b Springer Nature 
040 |a Uk  |b eng  |c Uk 
042 |a ukblsr 
082 0 4 |a 006.3/3  |2 23 
111 2 |a FICR-TEAS (Conference)  |n (1st :  |d 2020 :  |c Jaipur, India) 
245 1 0 |a Rising threats in expert applications and solutions  |b proceedings of FICR-TEAS 2020  |c Vijay Singh Rathore, Nilanjan Dey, Vincenzo Piuri, Rosalina Babo, Zdzislaw Polkowski, João Manuel R. S. Tavares, editors 
246 3 |a FICR-TEAS 2020 
264 1 |a Singapore  |b Springer  |c 2020 
264 4 |c ©2021 
300 |a 1 online resource (799 pages). 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
490 1 |a Advances in intelligent systems and computing  |x 2194-5357 ;  |v v. 1187 
505 0 |a Intro -- Preface -- Acknowledgments -- About This Book -- Contents -- About the Editors -- Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Preprocessing of Data -- 3.3 Sentimental Analysis Process -- 4 Result -- 5 Conclusion and Feature Work -- References -- Assessment of Needless Code in a Program -- 1 Introduction -- 2 Symbolic Execution -- 3 Proposed Algorithm -- 4 Sample Run 1 -- 5 Sample Run 2 -- 6 Conclusion -- References 
505 8 |a Query Caching Technique Over Cloud-Based MapReduce System: A Survey -- 1 Introduction -- 1.1 MapReduce Over Cloud -- 2 Caching in MapReduce -- 3 Literature Review -- 4 Conclusion -- References -- Fuzzy K-Means Clustering in Measuring Course Outcome Attainment System for Higher Educational Institutes -- 1 Introduction -- 2 Assessment Practices -- 3 Methodology -- 3.1 Rule Configuration Table -- 3.2 Mapping Table -- 3.3 Assessment Instrument Course Table -- 3.4 Question-CO Table -- 3.5 CO Attainment Measuring Module (CAMM) -- 4 Results and Discussion -- 5 Conclusion -- References 
505 8 |a A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment -- 1 Introduction -- 1.1 Types of Clouds in Cloud Computing -- 2 Review of Past Work -- 3 Comparison Among E-Commerce-Based Public Cloud (AWS, Google and Azure) -- 4 Conclusion and Future Work -- References -- An Implementation of Privacy Preserving "IF THEN ELSE" Rules for Vertically Partitioned Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Vertical Partitioned Data -- 3.2 Proposed PPDM Model -- 4 Result Analysis -- 4.1 Accuracy -- 4.2 Error Rate 
505 8 |a 4.3 Memory Usages -- 4.4 Time Consumed -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References -- An Essential E-Governance Framework for Knowledge Discovery -- 1 Introduction -- 1.1 Strategy of Implementation of E-Government -- 1.2 Web-Based Public Grievance System in E-Governance -- 1.3 Mobile-Based Public Grievance System in E-Governance -- 1.4 Technical Challenges in Existing Public Grievance System -- 2 Research Methodology -- 3 Conclusion -- References -- Vulnerability and Mitigation Strategies for Secure Expert Systems -- 1 Introduction 
505 8 |a 2 Expert Systems Security -- 3 Expert System Elements -- 4 Expert System Security Perspective -- 4.1 SQL Injection [5] -- 4.2 Cross-Site Scripting [7] -- 4.3 Buffer Overflow [9] -- 5 Conclusion -- References -- Developing a Quality Model to Study the Impact of Variability Over the Reusability and Maintainability of Software Product Line Variability Models -- 1 Introduction -- 2 Problem Identification and Statement -- 3 Proposed Quality Model -- 4 Future Work -- References -- Chunker for Gujarati Language Using Hybrid Approach -- 1 Chunking-Introduction -- 2 Literature Survey 
650 0 |a Expert systems (Computer science)  |x Security measures  |v Congresses. 
650 0 |a Computer security  |v Congresses. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 0 |a Electronic books. 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Rathore, Vijay Singh. 
700 1 |a Dey, Nilanjan. 
700 1 |a Piuri, Vincenzo. 
700 1 |a Babo, Rosalina. 
700 1 |a Polkowski, Zdzislaw. 
700 1 |a Tavares, João Manuel R. S. 
830 0 |a Advances in intelligent systems and computing ;  |v 1187. 
859 |a ELD  |b ebook 
884 |a LDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl  |g 20201005  |k com.springer.onix.9789811560149  |q Uk 
980 |a 019974554  |b 180  |c sid-180-col-bnbfidbbi 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fkatalog.fid-bbi.de%3Agenerator&rft.title=Rising+threats+in+expert+applications+and+solutions%3A+proceedings+of+FICR-TEAS+2020&rft.date=2020&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Rising+threats+in+expert+applications+and+solutions%3A+proceedings+of+FICR-TEAS+2020&rft.series=Advances+in+intelligent+systems+and+computing%2C+1187&rft.au=&rft.pub=Springer&rft.edition=&rft.isbn=9811560145
SOLR
_version_ 1778756644288593920
access_facet Electronic Resources
author2 Rathore, Vijay Singh., Dey, Nilanjan., Piuri, Vincenzo., Babo, Rosalina., Polkowski, Zdzislaw., Tavares, João Manuel R. S.
author2_role , , , , ,
author2_variant v s r vs vsr, n d nd, v p vp, r b rb, z p zp, j m r s t jmrs jmrst
author_corporate FICR-TEAS (Conference) (1st : 2020 : Jaipur, India)
author_corporate_role
author_facet Rathore, Vijay Singh., Dey, Nilanjan., Piuri, Vincenzo., Babo, Rosalina., Polkowski, Zdzislaw., Tavares, João Manuel R. S., FICR-TEAS (Conference) (1st : 2020 : Jaipur, India)
author_sort FICR-TEAS (Conference) Jaipur, India)
building Library A
callnumber-sort
collection sid-180-col-bnbfidbbi
contents Intro -- Preface -- Acknowledgments -- About This Book -- Contents -- About the Editors -- Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Preprocessing of Data -- 3.3 Sentimental Analysis Process -- 4 Result -- 5 Conclusion and Feature Work -- References -- Assessment of Needless Code in a Program -- 1 Introduction -- 2 Symbolic Execution -- 3 Proposed Algorithm -- 4 Sample Run 1 -- 5 Sample Run 2 -- 6 Conclusion -- References, Query Caching Technique Over Cloud-Based MapReduce System: A Survey -- 1 Introduction -- 1.1 MapReduce Over Cloud -- 2 Caching in MapReduce -- 3 Literature Review -- 4 Conclusion -- References -- Fuzzy K-Means Clustering in Measuring Course Outcome Attainment System for Higher Educational Institutes -- 1 Introduction -- 2 Assessment Practices -- 3 Methodology -- 3.1 Rule Configuration Table -- 3.2 Mapping Table -- 3.3 Assessment Instrument Course Table -- 3.4 Question-CO Table -- 3.5 CO Attainment Measuring Module (CAMM) -- 4 Results and Discussion -- 5 Conclusion -- References, A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment -- 1 Introduction -- 1.1 Types of Clouds in Cloud Computing -- 2 Review of Past Work -- 3 Comparison Among E-Commerce-Based Public Cloud (AWS, Google and Azure) -- 4 Conclusion and Future Work -- References -- An Implementation of Privacy Preserving "IF THEN ELSE" Rules for Vertically Partitioned Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Vertical Partitioned Data -- 3.2 Proposed PPDM Model -- 4 Result Analysis -- 4.1 Accuracy -- 4.2 Error Rate, 4.3 Memory Usages -- 4.4 Time Consumed -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References -- An Essential E-Governance Framework for Knowledge Discovery -- 1 Introduction -- 1.1 Strategy of Implementation of E-Government -- 1.2 Web-Based Public Grievance System in E-Governance -- 1.3 Mobile-Based Public Grievance System in E-Governance -- 1.4 Technical Challenges in Existing Public Grievance System -- 2 Research Methodology -- 3 Conclusion -- References -- Vulnerability and Mitigation Strategies for Secure Expert Systems -- 1 Introduction, 2 Expert Systems Security -- 3 Expert System Elements -- 4 Expert System Security Perspective -- 4.1 SQL Injection [5] -- 4.2 Cross-Site Scripting [7] -- 4.3 Buffer Overflow [9] -- 5 Conclusion -- References -- Developing a Quality Model to Study the Impact of Variability Over the Reusability and Maintainability of Software Product Line Variability Models -- 1 Introduction -- 2 Problem Identification and Statement -- 3 Proposed Quality Model -- 4 Future Work -- References -- Chunker for Gujarati Language Using Hybrid Approach -- 1 Chunking-Introduction -- 2 Literature Survey
dewey-full 006.3/3
dewey-hundreds 000 - Computer science, information & general works
dewey-ones 006 - Special computer methods
dewey-raw 006.3/3
dewey-search 006.3/3
dewey-sort 16.3 13
dewey-tens 000 - Computer science, knowledge & systems
facet_avail Online
finc_class_facet Informatik
fincclass_txtF_mv science-computerscience
format eBook
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Electronic books., Conference papers and proceedings. fast (OCoLC)fst01423772
genre_facet Congresses., Electronic books., Conference papers and proceedings.
geogr_code not assigned
geogr_code_person not assigned
id 180-019974554
illustrated Not Illustrated
imprint Singapore, Springer, 2020
imprint_str_mv Singapore Springer 2020
institution FID-BBI-DE-23
is_hierarchy_id
is_hierarchy_title
isbn 9789811560149
isbn_isn_mv 9789811560132
isil_str_mv FID-BBI-DE-23
issn_isn_mv 2194-5357 ;
language English
last_indexed 2023-10-03T17:35:26.411Z
match_str rathore2020risingthreatsinexpertapplicationsandsolutionsproceedingsofficrteas2020
mega_collection British National Bibliography
physical 1 online resource (799 pages)
publishDate 2020, ©2021
publishDateSort 2020
publishPlace Singapore,
publisher Springer,
record_format marcfinc
record_id 019974554
recordtype marcfinc
rvk_facet No subject assigned
series Advances in intelligent systems and computing, 1187
series2 Advances in intelligent systems and computing ; v. 1187
source_id 180
spelling FICR-TEAS (Conference) (1st : 2020 : Jaipur, India), Rising threats in expert applications and solutions proceedings of FICR-TEAS 2020 Vijay Singh Rathore, Nilanjan Dey, Vincenzo Piuri, Rosalina Babo, Zdzislaw Polkowski, João Manuel R. S. Tavares, editors, FICR-TEAS 2020, Singapore Springer 2020, ©2021, 1 online resource (799 pages)., text rdacontent, computer rdamedia, online resource rdacarrier, Advances in intelligent systems and computing 2194-5357 ; v. 1187, Intro -- Preface -- Acknowledgments -- About This Book -- Contents -- About the Editors -- Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Preprocessing of Data -- 3.3 Sentimental Analysis Process -- 4 Result -- 5 Conclusion and Feature Work -- References -- Assessment of Needless Code in a Program -- 1 Introduction -- 2 Symbolic Execution -- 3 Proposed Algorithm -- 4 Sample Run 1 -- 5 Sample Run 2 -- 6 Conclusion -- References, Query Caching Technique Over Cloud-Based MapReduce System: A Survey -- 1 Introduction -- 1.1 MapReduce Over Cloud -- 2 Caching in MapReduce -- 3 Literature Review -- 4 Conclusion -- References -- Fuzzy K-Means Clustering in Measuring Course Outcome Attainment System for Higher Educational Institutes -- 1 Introduction -- 2 Assessment Practices -- 3 Methodology -- 3.1 Rule Configuration Table -- 3.2 Mapping Table -- 3.3 Assessment Instrument Course Table -- 3.4 Question-CO Table -- 3.5 CO Attainment Measuring Module (CAMM) -- 4 Results and Discussion -- 5 Conclusion -- References, A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment -- 1 Introduction -- 1.1 Types of Clouds in Cloud Computing -- 2 Review of Past Work -- 3 Comparison Among E-Commerce-Based Public Cloud (AWS, Google and Azure) -- 4 Conclusion and Future Work -- References -- An Implementation of Privacy Preserving "IF THEN ELSE" Rules for Vertically Partitioned Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Vertical Partitioned Data -- 3.2 Proposed PPDM Model -- 4 Result Analysis -- 4.1 Accuracy -- 4.2 Error Rate, 4.3 Memory Usages -- 4.4 Time Consumed -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References -- An Essential E-Governance Framework for Knowledge Discovery -- 1 Introduction -- 1.1 Strategy of Implementation of E-Government -- 1.2 Web-Based Public Grievance System in E-Governance -- 1.3 Mobile-Based Public Grievance System in E-Governance -- 1.4 Technical Challenges in Existing Public Grievance System -- 2 Research Methodology -- 3 Conclusion -- References -- Vulnerability and Mitigation Strategies for Secure Expert Systems -- 1 Introduction, 2 Expert Systems Security -- 3 Expert System Elements -- 4 Expert System Security Perspective -- 4.1 SQL Injection [5] -- 4.2 Cross-Site Scripting [7] -- 4.3 Buffer Overflow [9] -- 5 Conclusion -- References -- Developing a Quality Model to Study the Impact of Variability Over the Reusability and Maintainability of Software Product Line Variability Models -- 1 Introduction -- 2 Problem Identification and Statement -- 3 Proposed Quality Model -- 4 Future Work -- References -- Chunker for Gujarati Language Using Hybrid Approach -- 1 Chunking-Introduction -- 2 Literature Survey, Expert systems (Computer science) Security measures Congresses., Computer security Congresses., Computer security. fast (OCoLC)fst00872484, Electronic books., Conference papers and proceedings. fast (OCoLC)fst01423772, Rathore, Vijay Singh., Dey, Nilanjan., Piuri, Vincenzo., Babo, Rosalina., Polkowski, Zdzislaw., Tavares, João Manuel R. S., Advances in intelligent systems and computing ; 1187., ELD ebook, LDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl 20201005 com.springer.onix.9789811560149 Uk
spellingShingle Rising threats in expert applications and solutions: proceedings of FICR-TEAS 2020, Advances in intelligent systems and computing, 1187, Intro -- Preface -- Acknowledgments -- About This Book -- Contents -- About the Editors -- Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Preprocessing of Data -- 3.3 Sentimental Analysis Process -- 4 Result -- 5 Conclusion and Feature Work -- References -- Assessment of Needless Code in a Program -- 1 Introduction -- 2 Symbolic Execution -- 3 Proposed Algorithm -- 4 Sample Run 1 -- 5 Sample Run 2 -- 6 Conclusion -- References, Query Caching Technique Over Cloud-Based MapReduce System: A Survey -- 1 Introduction -- 1.1 MapReduce Over Cloud -- 2 Caching in MapReduce -- 3 Literature Review -- 4 Conclusion -- References -- Fuzzy K-Means Clustering in Measuring Course Outcome Attainment System for Higher Educational Institutes -- 1 Introduction -- 2 Assessment Practices -- 3 Methodology -- 3.1 Rule Configuration Table -- 3.2 Mapping Table -- 3.3 Assessment Instrument Course Table -- 3.4 Question-CO Table -- 3.5 CO Attainment Measuring Module (CAMM) -- 4 Results and Discussion -- 5 Conclusion -- References, A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment -- 1 Introduction -- 1.1 Types of Clouds in Cloud Computing -- 2 Review of Past Work -- 3 Comparison Among E-Commerce-Based Public Cloud (AWS, Google and Azure) -- 4 Conclusion and Future Work -- References -- An Implementation of Privacy Preserving "IF THEN ELSE" Rules for Vertically Partitioned Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Vertical Partitioned Data -- 3.2 Proposed PPDM Model -- 4 Result Analysis -- 4.1 Accuracy -- 4.2 Error Rate, 4.3 Memory Usages -- 4.4 Time Consumed -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References -- An Essential E-Governance Framework for Knowledge Discovery -- 1 Introduction -- 1.1 Strategy of Implementation of E-Government -- 1.2 Web-Based Public Grievance System in E-Governance -- 1.3 Mobile-Based Public Grievance System in E-Governance -- 1.4 Technical Challenges in Existing Public Grievance System -- 2 Research Methodology -- 3 Conclusion -- References -- Vulnerability and Mitigation Strategies for Secure Expert Systems -- 1 Introduction, 2 Expert Systems Security -- 3 Expert System Elements -- 4 Expert System Security Perspective -- 4.1 SQL Injection [5] -- 4.2 Cross-Site Scripting [7] -- 4.3 Buffer Overflow [9] -- 5 Conclusion -- References -- Developing a Quality Model to Study the Impact of Variability Over the Reusability and Maintainability of Software Product Line Variability Models -- 1 Introduction -- 2 Problem Identification and Statement -- 3 Proposed Quality Model -- 4 Future Work -- References -- Chunker for Gujarati Language Using Hybrid Approach -- 1 Chunking-Introduction -- 2 Literature Survey, Expert systems (Computer science) Security measures Congresses., Computer security Congresses., Computer security., Electronic books., Conference papers and proceedings.
title Rising threats in expert applications and solutions: proceedings of FICR-TEAS 2020
title_alt FICR-TEAS 2020
title_auth Rising threats in expert applications and solutions proceedings of FICR-TEAS 2020
title_full Rising threats in expert applications and solutions proceedings of FICR-TEAS 2020 Vijay Singh Rathore, Nilanjan Dey, Vincenzo Piuri, Rosalina Babo, Zdzislaw Polkowski, João Manuel R. S. Tavares, editors
title_fullStr Rising threats in expert applications and solutions proceedings of FICR-TEAS 2020 Vijay Singh Rathore, Nilanjan Dey, Vincenzo Piuri, Rosalina Babo, Zdzislaw Polkowski, João Manuel R. S. Tavares, editors
title_full_unstemmed Rising threats in expert applications and solutions proceedings of FICR-TEAS 2020 Vijay Singh Rathore, Nilanjan Dey, Vincenzo Piuri, Rosalina Babo, Zdzislaw Polkowski, João Manuel R. S. Tavares, editors
title_in_hierarchy 1187.. Rising threats in expert applications and solutions: proceedings of FICR-TEAS 2020 (2020)
title_short Rising threats in expert applications and solutions
title_sort rising threats in expert applications and solutions proceedings of ficr teas 2020
title_sub proceedings of FICR-TEAS 2020
topic Expert systems (Computer science) Security measures Congresses., Computer security Congresses., Computer security., Electronic books., Conference papers and proceedings.
topic_facet Expert systems (Computer science), Computer security, Computer security., Security measures, Electronic books., Conference papers and proceedings.