0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (9)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Artificial Intelligence and Deep Learning for Computer Network - Management and Analysis (Hardcover): Sangita Roy, Rajat Subhra... Artificial Intelligence and Deep Learning for Computer Network - Management and Analysis (Hardcover)
Sangita Roy, Rajat Subhra Chakraborty, Jimson Mathew, Arka Prokash Mazumdar, Sudeshna Chakraborty
R3,013 Discovery Miles 30 130 Ships in 9 - 15 working days

Artificial Intelligence and Deep Learning for Computer Network: Management and Analysis aims to systematically collect quality research spanning AI, ML and Deep Learning (DL) applications to diverse sub-topics of computer networks, communications, and security, under a single cover. It also aspires to provide more insights on the applicability of the theoretical similitudes, otherwise a rarity in many such books. Features: A diverse collection of important and cutting-edge topics covered in a single volume. Several chapters on cyber security, an extremely active research area. Recent research results from leading researchers and some pointers to future advancements in methodology. Detailed experimental results obtained from standard data sets. This book serves as a valuable reference book for students, researchers and practitioners who wish to study and get acquainted with the application of cutting-edge AI, ML and DL techniques to network management and cyber security.

Hardware Security - Design, Threats, and Safeguards (Hardcover): Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Hardware Security - Design, Threats, and Safeguards (Hardcover)
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
R4,047 Discovery Miles 40 470 Ships in 12 - 17 working days

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC)."

Gain a Comprehensive Understanding of Hardware Security from Fundamentals to Practical Applications"

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards

  • Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
  • Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
  • Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention
"

Design for Security and Meet Real-Time Requirements"

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards."

High Performance Integer Arithmetic Circuit Design on FPGA - Architecture, Implementation and Design Automation (Paperback,... High Performance Integer Arithmetic Circuit Design on FPGA - Architecture, Implementation and Design Automation (Paperback, Softcover reprint of the original 1st ed. 2016)
Ayan Palchaudhuri, Rajat Subhra Chakraborty
R3,310 Discovery Miles 33 100 Ships in 10 - 15 working days

This book describes the optimized implementations of several arithmetic datapath, controlpath and pseudorandom sequence generator circuits for realization of high performance arithmetic circuits targeted towards a specific family of the high-end Field Programmable Gate Arrays (FPGAs). It explores regular, modular, cascadable and bit-sliced architectures of these circuits, by directly instantiating the target FPGA-specific primitives in the HDL. Every proposed architecture is justified with detailed mathematical analyses. Simultaneously, constrained placement of the circuit building blocks is performed, by placing the logically related hardware primitives in close proximity to one another by supplying relevant placement constraints in the Xilinx proprietary "User Constraints File". The book covers the implementation of a GUI-based CAD tool named FlexiCore integrated with the Xilinx Integrated Software Environment (ISE) for design automation of platform-specific high-performance arithmetic circuits from user-level specifications. This tool has been used to implement the proposed circuits, as well as hardware implementations of integer arithmetic algorithms where several of the proposed circuits are used as building blocks. Implementation results demonstrate higher performance and superior operand-width scalability for the proposed circuits, with respect to implementations derived through other existing approaches. This book will prove useful to researchers, students and professionals engaged in the domain of FPGA circuit optimization and implementation.

High Performance Integer Arithmetic Circuit Design on FPGA - Architecture, Implementation and Design Automation (Hardcover, 1st... High Performance Integer Arithmetic Circuit Design on FPGA - Architecture, Implementation and Design Automation (Hardcover, 1st ed. 2016)
Ayan Palchaudhuri, Rajat Subhra Chakraborty
R3,552 Discovery Miles 35 520 Ships in 10 - 15 working days

This book describes the optimized implementations of several arithmetic datapath, controlpath and pseudorandom sequence generator circuits for realization of high performance arithmetic circuits targeted towards a specific family of the high-end Field Programmable Gate Arrays (FPGAs). It explores regular, modular, cascadable and bit-sliced architectures of these circuits, by directly instantiating the target FPGA-specific primitives in the HDL. Every proposed architecture is justified with detailed mathematical analyses. Simultaneously, constrained placement of the circuit building blocks is performed, by placing the logically related hardware primitives in close proximity to one another by supplying relevant placement constraints in the Xilinx proprietary "User Constraints File". The book covers the implementation of a GUI-based CAD tool named FlexiCore integrated with the Xilinx Integrated Software Environment (ISE) for design automation of platform-specific high-performance arithmetic circuits from user-level specifications. This tool has been used to implement the proposed circuits, as well as hardware implementations of integer arithmetic algorithms where several of the proposed circuits are used as building blocks. Implementation results demonstrate higher performance and superior operand-width scalability for the proposed circuits, with respect to implementations derived through other existing approaches. This book will prove useful to researchers, students and professionals engaged in the domain of FPGA circuit optimization and implementation.

Deep Learning for Computational Problems in Hardware Security - Modeling Attacks on Strong Physically Unclonable Function... Deep Learning for Computational Problems in Hardware Security - Modeling Attacks on Strong Physically Unclonable Function Circuits (Hardcover, 1st ed. 2023)
Pranesh Santikellur, Rajat Subhra Chakraborty
R2,930 Discovery Miles 29 300 Ships in 10 - 15 working days

The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.

Digital Image Forensics - Theory and Implementation (Hardcover, 1st ed. 2020): Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat... Digital Image Forensics - Theory and Implementation (Hardcover, 1st ed. 2020)
Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty
R3,466 Discovery Miles 34 660 Ships in 10 - 15 working days

This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on "copy-move forgery" in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on "Digital Image Processing", "Information Security", "Machine Learning", "Computer Vision" and "Multimedia Security and Forensics".

Security and Fault Tolerance in Internet of Things (Hardcover, 1st ed. 2019): Rajat Subhra Chakraborty, Jimson Mathew,... Security and Fault Tolerance in Internet of Things (Hardcover, 1st ed. 2019)
Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V Vasilakos
R3,479 Discovery Miles 34 790 Ships in 10 - 15 working days

This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.

Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7,... Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings (Paperback, 1st ed. 2015)
Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
R2,715 Discovery Miles 27 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.

Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22,... Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings (Paperback, 2014 ed.)
Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont
R2,604 Discovery Miles 26 040 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in Pune, India, in October 2014. The 19 papers presented together with two invited papers were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on cryptographic building blocks; mini tutorial; attacks and countermeasures; tools and methods; and secure systems and applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Endless Love
Alex Pettyfer, Gabriella Wilde, … Blu-ray disc  (1)
R54 Discovery Miles 540
I Shouldnt Be Telling You This
Jeff Goldblum, The Mildred Snitzer Orchestra CD R74 R63 Discovery Miles 630
Tenet
John David Washington, Robert Pattinson Blu-ray disc  (1)
R54 Discovery Miles 540
Frozen - Blu-Ray + DVD
Blu-ray disc R344 Discovery Miles 3 440
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Sony PlayStation 5 DualSense Wireless…
R1,599 R1,479 Discovery Miles 14 790
Shield Car Polish Paste (300ml)
R59 Discovery Miles 590
Dig & Discover: Dinosaurs - Excavate 2…
Hinkler Pty Ltd Kit R304 R267 Discovery Miles 2 670
The End, So Far
Slipknot CD R498 Discovery Miles 4 980
Genius NX-8008S Silent Click Wireless…
R150 Discovery Miles 1 500

 

Partners