Sisällysluettelo:
“…Rosenberger III, Wilson K.S. Leung, and Kin Yi Lee -- Perceived value of images carrying tourism location information on social media and customer brand engagement / Khalil Hussain, Amir Zaib Abbasi, Muddasar Ghani Khwaja, Ali Hussain, and Ting Ding Hooi -- Creating customer value-in-use based experience in the tourism industry : a conceptual framework / Mohsin Abdur Rehman, Shoaib Muhammad, and Raouf Ahmad Rather --Player- and spectator-engagement and co-creation in E-sports gaming events during and post-COVID-19 / Adele Berndt, Linda D. …”
Sisällysluettelo:
“…Prem Laxman Das -- Analysis of quantum computing with food processing use case / Dhaval S Jha, Het Shah and Jai Prakash Verma -- Security of modern networks and its challenges / Apurv Garg, Bhartendu Sharma, Anmol Gupta and Rijwan Khan -- Security and performance analysis of advanced metering infrastructure in smart grid and use of blockchain in security perspective / Khushboo Gupta and Vinod Kumar -- Computation and storage efficient key distribution protocol for secure multicast communication in centralized environments / Vinod Kumar, Khushboo Gupta, Om Pal, Rajendra Kumar, Pradeep Kumar Tiwari, Narendra Kumar Updhyay and Mukesh Kumar Bhardwaj --Effective key agreement protocol for large and dynamic groups using elliptic curve cryptography / Vinod Kumar, Khushboo Gupta, Om Pal, Shiv Prakash, Pravin Kumar, Shiv Veer Singh, Pradeep Kumar Tiwari and Animesh Tripathi -- Cyber security using artificial intelligence / Sapna Katiyar -- Cloud computing : an overview of security risk assessment models & frameworks / Subarna Ghosh, Nafees Mansoor and Mohammad Shahriar Rahman -- Generating cyber threat intelligence to discover potential security threats using classification and topic modeling / Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed and Mohammed Masudur Rahman -- Cyber-physical energy systems security : attacks, vulnerabilities and risk management / Sayada Sonia Akter, Rezwan Ahmed, Ferdous Hasan Khan and Mohammad Shahriar Rahman -- Intrusion detection using machine learning / Rijwan Khan, Aditi Tiwari, Aashna Kapoor and Abhyudaya Mittal --Network forensic / Sandeep Kaur, Manjit Sandhu, Sandeep Sharma and Ravinder Singh Sawhney -- A deep neural network based biometric random key generator for security -- enhancement / Sannidhan M S, Jason Elroy Martis and Sudeepa K B -- Quantum computing and its real-world applications / Pawan Mishra, Ravi Kamal Pandey and Pooja -- Encrypted network traffic classification and application identification employing deep learning / Jyoti Mishra and Mahendra Tiwari…”