This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3-4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest…mehr
This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3-4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, andmethods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.
Produktdetails
Produktdetails
Lecture Notes on Data Engineering and Communications Technologies 73
Prof. Kavita Khanna has done M.Tech. Computer Engineering, MDU, Rohtak, and Ph.D. in Computer Graphics and Soft Computing Techniques, GGSIPU, Delhi. With 21 years of teaching, administration, and research experience, currently she is associated with The NorthCap University, Gurugram, as Professor and Head of the Department (CSE Department). Her interests include arti¿cial neural networks, computer graphics, cryptographic techniques, arti¿cial intelligence: metaheuristic techniques, neural networks, machine learning, and analysis and design of algo- rithms. She has more than 60 publications in reputed journals, conferences, and chapters. She has guided many M.Tech. and Ph.D. students. Prof. Khanna is receiving a research grant from the Department of Science and Technology (DST), India, and NTRO for research projects. She has also organized various conferences, workshops, FDPs and has been Reviewer, Session Chair, and Committee Member of conferences and journals. Vania Vieira Estrela B.S. degree from Federal University of Rio de Janeiro (UFRJ) in Electrical and Computer Engineering (ECE); M.Sc. from the Technological Insti- tute of Aeronautics (ITA), Brazil; M.Sc. degree in ECE at Northwestern University, USA; and Ph.D. in ECE from the Illinois Institute of Technology (IIT), Chicago, IL, USA. Taught at DePaul University, USA, and Universidade Estadual do Norte Fluminense (UENF), Brazil. She was visiting professor at the Polytechnic Institute of Rio de Janeiro (IPRJ)/State University of Rio de Janeiro (UERJ) in Brazil and currently working at UFF's Department of Telecommunications. Research interests include signal/image/video processing, inverse problems, computational & mathe- matical modeling, stochastic models, multimedia, communications, motion estima- tion, machine learning, and geoprocessing. She reviews several journal/magazine articles, and she is deputy editor of the Neuroscience Informatics journal (Elsevier). She is engaged in technology transfer, STEAM education, environmental issues, and digital inclusion. Editor of several books and special issues. Member of IEEE and ACM. Joel José Puga Coelho Rodrigues [Fellow, AAIA and IEEE] is a professor at the Federal University of Piauí, Brazil; and senior researcher at the Instituto de Telecomu- nicações, Portugal. Prof. Rodrigues is the leader of the Next Generation Networks and Applications (NetGNA) research group (CNPq), an IEEE Distinguished Lecturer, Member Representative of the IEEE Communications Society on the IEEE Biomet- rics Council, and the President of the scienti¿c council at ParkUrbis-Covilhã Science and Technology Park. He was Director for Conference Development- IEEE ComSoc Board of Governors, Technical Activities Committee Chair of the IEEE ComSoc Latin America Region Board, a Past-Chair of the IEEE ComSoc Technical Committee (TC) on eHealth and the TC on Communications Software, a Steering Committee member of the IEEE Life Sciences Technical Community and Publications co-Chair. He is the editor-in-chief of the International Journal of E-Health and Medical Communications and editorial board member of several high- reputed journals (mainly, from IEEE). He has been general chair and TPC Chair of many international conferences, including IEEE ICC, IEEE GLOBECOM, IEEE HEALTHCOM, and IEEE LatinCom. He has authored or coauthored about 1000 papers in refereed international journals and conferences, 3 books, 2 patents, and 1 ITU-T Recommendation. He had been awarded several Outstanding Leadership and Outstanding Service Awards by IEEE Communications Society and several best papers awards. Prof. Rodrigues is a member of the Internet Society, a senior member ACM, and Fellow of AAIA and IEEE.
Inhaltsangabe
Chapter 1. A systematic approach for analyzing log files based on string matching regular expressions.- Chapter 2. An efficient detection and prevention approach of unknown malicious attack: A novel honeypot approach.- Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare System in Uttarakhand.- Chapter 4. Android Malware Detection using Extreme Learning Machine optimized with Swarm Intelligence.- Chapter 5. Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform.- Chapter 6. Authentication of Digital Media using Reversible Watermarking.- Chapter 7. Automatic Test Case Generation and Fault Tolerant Framework Based on N Version and Recovery Block Mechanism.- Chapter 8. Chatbot to Map Medical Prognosis and Symptoms using Machine Learning.- Chapter 9. Cloud Security: The Future of Data Storage.- Chapter 10. Curbing Criminal Acts on Mobile Phone Network.- Chapter 11. Designing of Fuzzy logic-based Intrusion detection system (FIDS) for detection of Blckhole attack in AODV for MANETs.- Chapter 12. Detection of Phishing Websites Using Classification Algorithms.- Chapter 13. IoT Based Smart Security System for Agriculture Fields.- Chapter 14. Efficient Clustering of Transactional data for Privacy-Preserving Data Publishing.- Chapter 15. Passive Video Forgery Detection Techniques to Detect Copy Move Tampering through Feature Comparison and RANSAC.
Chapter 1. A systematic approach for analyzing log files based on string matching regular expressions.- Chapter 2. An efficient detection and prevention approach of unknown malicious attack: A novel honeypot approach.- Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare System in Uttarakhand.- Chapter 4. Android Malware Detection using Extreme Learning Machine optimized with Swarm Intelligence.- Chapter 5. Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform.- Chapter 6. Authentication of Digital Media using Reversible Watermarking.- Chapter 7. Automatic Test Case Generation and Fault Tolerant Framework Based on N Version and Recovery Block Mechanism.- Chapter 8. Chatbot to Map Medical Prognosis and Symptoms using Machine Learning.- Chapter 9. Cloud Security: The Future of Data Storage.- Chapter 10. Curbing Criminal Acts on Mobile Phone Network.- Chapter 11. Designing of Fuzzy logic-based Intrusion detection system (FIDS) for detection of Blckhole attack in AODV for MANETs.- Chapter 12. Detection of Phishing Websites Using Classification Algorithms.- Chapter 13. IoT Based Smart Security System for Agriculture Fields.- Chapter 14. Efficient Clustering of Transactional data for Privacy-Preserving Data Publishing.- Chapter 15. Passive Video Forgery Detection Techniques to Detect Copy Move Tampering through Feature Comparison and RANSAC.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826