![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Design and implementation of Negative Authentication System
Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber syst...
-
Chapter
Machine Learning Algorithm Acceleration Using Hybrid (CPU-MPP) MapReduce Clusters
The uninterrupted growth of information repositories has progressively led data-intensive applications, such as MapReduce-based systems, to the mainstream. The MapReduce paradigm has frequently proven to be a...
-
Chapter and Conference Paper
Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining
Advanced metering infrastructure (AMI) is an imperative component of the smart grid, as it is responsible for collecting, measuring, analyzing energy usage data, and transmitting these data to the data concent...
-
Chapter and Conference Paper
Discerning Industrial Networks, Clusters and Competences – An Alternative View Using Web Mining Techniques
This short extract is part of a wider study into the use of the web for research into the presence and structure of industrial clusters and is concerned here with the discernment of networks of firms and the p...
-
Chapter
Anti-Counterfeiting and Supply Chain Security
Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illic...