Cyber Security
Proceedings of CSI 2015
Herausgegeben:Bokhari, M. U.; Agrawal, Namrata; Saini, Dharmendra
Cyber Security
Proceedings of CSI 2015
Herausgegeben:Bokhari, M. U.; Agrawal, Namrata; Saini, Dharmendra
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book…mehr
- Resilience of Cyber-Physical Systems103,99 €
- Critical Infrastructure Security and Resilience110,99 €
- Samer Al-khateebDeviance in Social Media and Social Cyber Forensics46,99 €
- Xiaodong LinIntroductory Computer Forensics82,99 €
- Security and Privacy Trends in the Industrial Internet of Things95,99 €
- Aamo IorliamCybersecurity in Nigeria41,99 €
- Holger KaschnerCyber Crisis Management44,99 €
-
-
-
- Produktdetails
- Advances in Intelligent Systems and Computing 729
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-10-8535-2
- 1st ed. 2018
- Seitenzahl: 532
- Erscheinungstermin: 28. April 2018
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 882g
- ISBN-13: 9789811085352
- ISBN-10: 9811085358
- Artikelnr.: 50790303
- Advances in Intelligent Systems and Computing 729
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-10-8535-2
- 1st ed. 2018
- Seitenzahl: 532
- Erscheinungstermin: 28. April 2018
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 882g
- ISBN-13: 9789811085352
- ISBN-10: 9811085358
- Artikelnr.: 50790303
Advanced RSA Cryptographic Algorithm for Improving Data Security.
Different Security Mechanisms in Two Factor Authentication for Collaborative Computing Environment.
Changing Trend in Network Security Measures: A Review.
An Improved RED Algorithm with Input Sensitivity.
Security Attacks in Wireless Sensor Networks: A Survey.
Symmetric Key Encryption Technique: A Cellular Automata Based Approach.
A Comparative study on Lightweight Cryptography.
GPS Hash Table Based Location Identifier Algorithm For Security and Integrity Against Vampire Attacks.
Data Security Model in Cloud Computing Environment.
Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud Based Environment.
DNA Based Cryptography for Security in Wireless Sensor Networks.
Privacy Preservation Using Various Anonymity Models.
A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks.
An Advanced Dynamic Authentic Security Method for Cloud Computing.
Security in CryptDB Using Fine Grained Access Controls with ECDHE
ZeroVi's Framework.
Mitigating Cloud Security Threats Using Public Key Infrastructure.
Analysis and Impact of Different Mechanisms of Defending Pass the Hash Attacks.
Data Security and Encryption Technique for Cloud Storage.
Fine Grained Access Control and Secured Data Sharing in Cloud Computing.
Comparative Study of Security Risk in Social Networking and Awareness to Individual.
A Key Based Spiral Approach for DNA Cryptography.
Permission
Set Based Detection and Analysis of Android Malware.
Three Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.
Digital Security an Enigma.
ICMP Flood Attacks: A Vulnerability Analysis.
Statistical Approach Using Meta Features for Android Malware Detection System.
Composite Email Features for Spam Identification.
Role of Multiple Encryption in Biometric Devices.
Buffer Overflow and SQL Injection: To Remotely Attack and Access Information.
Prime Numbers: Foundation of Cryptography.
Steganography: A Survey.
Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad
hoc Networks.
Hardware Trojans: An Austere Menace Ahead.
Cyber Security for Supervisory Control and Data Acquisition.
k Barrier Coverage Based Intrusion Detection for Wireless Sensor Networks.
Performance Analysis of Vulnerability Detection Scanners for Web Systems.
Performance Evaluation of Multicast Source Authentication Scheme.
Design and Implementation of a Secure Hierarchical Trust Model for PKI.
Encryption and Decryption Technique Using Java.
Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment.
Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence.
A Robust Server
Side JavaScript Feature Injection
Based Design for JSP Web Applications Against XSS Vulnerabilities.
PHISH
SAFE: URL Features Based Phishing Detection System Using Machine Learning.
Semantic Security for Sharing Computing Knowledge/Information.
Paradigmatic Approach to Cloud Security: Challenges and Remedies.
The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm.
Gaussian Tendencies in Data Flow in Communication Links.
Advanced RSA Cryptographic Algorithm for Improving Data Security.
Different Security Mechanisms in Two Factor Authentication for Collaborative Computing Environment.
Changing Trend in Network Security Measures: A Review.
An Improved RED Algorithm with Input Sensitivity.
Security Attacks in Wireless Sensor Networks: A Survey.
Symmetric Key Encryption Technique: A Cellular Automata Based Approach.
A Comparative study on Lightweight Cryptography.
GPS Hash Table Based Location Identifier Algorithm For Security and Integrity Against Vampire Attacks.
Data Security Model in Cloud Computing Environment.
Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud Based Environment.
DNA Based Cryptography for Security in Wireless Sensor Networks.
Privacy Preservation Using Various Anonymity Models.
A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks.
An Advanced Dynamic Authentic Security Method for Cloud Computing.
Security in CryptDB Using Fine Grained Access Controls with ECDHE
ZeroVi's Framework.
Mitigating Cloud Security Threats Using Public Key Infrastructure.
Analysis and Impact of Different Mechanisms of Defending Pass the Hash Attacks.
Data Security and Encryption Technique for Cloud Storage.
Fine Grained Access Control and Secured Data Sharing in Cloud Computing.
Comparative Study of Security Risk in Social Networking and Awareness to Individual.
A Key Based Spiral Approach for DNA Cryptography.
Permission
Set Based Detection and Analysis of Android Malware.
Three Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.
Digital Security an Enigma.
ICMP Flood Attacks: A Vulnerability Analysis.
Statistical Approach Using Meta Features for Android Malware Detection System.
Composite Email Features for Spam Identification.
Role of Multiple Encryption in Biometric Devices.
Buffer Overflow and SQL Injection: To Remotely Attack and Access Information.
Prime Numbers: Foundation of Cryptography.
Steganography: A Survey.
Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad
hoc Networks.
Hardware Trojans: An Austere Menace Ahead.
Cyber Security for Supervisory Control and Data Acquisition.
k Barrier Coverage Based Intrusion Detection for Wireless Sensor Networks.
Performance Analysis of Vulnerability Detection Scanners for Web Systems.
Performance Evaluation of Multicast Source Authentication Scheme.
Design and Implementation of a Secure Hierarchical Trust Model for PKI.
Encryption and Decryption Technique Using Java.
Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment.
Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence.
A Robust Server
Side JavaScript Feature Injection
Based Design for JSP Web Applications Against XSS Vulnerabilities.
PHISH
SAFE: URL Features Based Phishing Detection System Using Machine Learning.
Semantic Security for Sharing Computing Knowledge/Information.
Paradigmatic Approach to Cloud Security: Challenges and Remedies.
The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm.
Gaussian Tendencies in Data Flow in Communication Links.