Cyber Security and Digital Forensics

Cyber Security and Digital Forensics
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
Proceedings of ICCSDF 2021
 eBook
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 213,99 €

Jetzt 213,98 €* eBook

Artikel-Nr:
9789811639616
Veröffentl:
2021
Einband:
eBook
Seiten:
623
Autor:
Kavita Khanna
Serie:
73, Lecture Notes on Data Engineering and Communications Technologies
eBook Typ:
PDF
eBook Format:
Reflowable eBook
Kopierschutz:
Digital Watermark [Social-DRM]
Sprache:
Englisch
Beschreibung:

This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3-4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.

This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3–4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.

Chapter 1. A systematic approach for analyzing log files based on string matching regular expressions.- Chapter 2. An efficient detection and prevention approach of unknown malicious attack: A novel honeypot approach.- Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare System in Uttarakhand.- Chapter 4. Android Malware Detection using Extreme Learning Machine optimized with Swarm Intelligence.- Chapter 5. Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform.- Chapter 6. Authentication of Digital Media using Reversible Watermarking.- Chapter 7. Automatic Test Case Generation and Fault Tolerant Framework Based on N Version and Recovery Block Mechanism.- Chapter 8. Chatbot to Map Medical Prognosis and Symptoms using Machine Learning.- Chapter 9. Cloud Security: The Future of Data Storage.- Chapter 10. Curbing Criminal Acts on Mobile Phone Network.- Chapter 11. Designing of Fuzzy logic-based Intrusion detection system (FIDS)  for detection of Blckhole attack in AODV for MANETs.- Chapter 12. Detection of Phishing Websites Using Classification Algorithms.- Chapter 13. IoT Based Smart Security System for Agriculture Fields.- Chapter 14. Efficient Clustering of Transactional data for Privacy-Preserving Data Publishing.- Chapter 15. Passive Video Forgery Detection Techniques to Detect Copy Move Tampering through Feature Comparison and RANSAC.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.