Current Catalog
Archive Catalog
Editorial Board
Book Submissions
Announcements
About The Series
Publishing Fee
Book Chapter Preparation Guidelines
Submit a Book Chapter: Step by Step Guide
Quality Measures
Ethics Approval and Informed Consent
Privacy Statement
Conflict of Interest
Disclaimer
Book Chapter: Peer Review Process
Open Access Books Licenses, Copyrights, and Permissions
Privacy Policy
Book Editors: Qualifications and Responsibilities
Publication Ethics
Author Guidelines
Contact
Search
English
Register
Login
Current Catalog
Archive Catalog
Editorial Board
Book Submissions
Announcements
About The Series
Publishing Fee
Book Chapter Preparation Guidelines
Submit a Book Chapter: Step by Step Guide
Quality Measures
Ethics Approval and Informed Consent
Privacy Statement
Conflict of Interest
Disclaimer
Book Chapter: Peer Review Process
Open Access Books Licenses, Copyrights, and Permissions
Privacy Policy
Book Editors: Qualifications and Responsibilities
Publication Ethics
Author Guidelines
Contact
Search
Language
English
Search
Register
Login
International Multidisciplinary Book Series Vol. 3 (2025)
Home
/
Archives
/
International Multidisciplinary Book Series Vol. 3 (2025)
Published:
2025-01-10
Edited
ADVERSARIAL ATTACKS ON FEDERATED LEARNING MODELS IN HEALTHCARE DATA ECOSYSTEMS
Soumili Kundu
Chapter 1
POST-QUANTUM CRYPTOGRAPHY FOR SECURING BLOCKCHAIN-BASED FINANCIAL TRANSACTIONS
Soumili Saha
Chapter 2
SIDE-CHANNEL VULNERABILITIES IN TRUSTED EXECUTION ENVIRONMENTS (TEES): A MICROARCHITECTURAL ANALYSIS
Shruti Pramanik
Chapter 3
SECURITY IMPLICATIONS OF SYNTHETIC DATA GENERATION: MEMBERSHIP INFERENCE AND MODEL LEAKAGE RISKS
Roshmi Paul
Chapter 4
INSIDER THREAT DETECTION USING GRAPH NEURAL NETWORKS ON ENTERPRISE ACCESS LOGS
Anubhab Sen
Chapter 5
DATA LEAKAGE PREVENTION IN AI-POWERED RECOMMENDATION SYSTEMS USING HOMOMORPHIC ENCRYPTION
Pinki Oraon
Chapter 6
DIFFERENTIAL PRIVACY MECHANISMS FOR SMART CITY IOT DATA STREAMS: UTILITY–PRIVACY TRADE-OFFS
Saniya Mondal
Chapter 7
RANSOMWARE PROPAGATION MODELING IN INDUSTRIAL CONTROL SYSTEMS (ICS) NETWORKS
Soumadeep Biswas
Chapter 8
SECURE MULTI-PARTY COMPUTATION PROTOCOLS FOR PRIVACY-PRESERVING GENOMIC DATA ANALYSIS
Tanusree Mondal
Chapter 9
ZERO-TRUST ARCHITECTURE IMPLEMENTATION IN MULTI-CLOUD KUBERNETES ENVIRONMENTS
Chanda Rani Sen
Chapter 10
Loading...