buchspektrum Internet-Buchhandlung

Neuerscheinungen 2018

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Valentina E. Balas, Satyajit Chakrabarti, Mohuya Chakraborty, J. K. Mandal (Beteiligte)

Proceedings of International Ethical Hacking Conference 2018


eHaCON 2018, Kolkata, India
Herausgegeben von Chakraborty, Mohuya; Chakrabarti, Satyajit; Balas, Valentina E.; Mandal, J. K.
1st ed. 2019. 2018. xxvi, 506 S. 206 SW-Abb., 50 Farbtabellen. 235 mm
Verlag/Jahr: SPRINGER, BERLIN; SPRINGER SINGAPORE; SPRINGER 2018
ISBN: 9811315434 (9811315434)
Neue ISBN: 978-9811315435 (9789811315435)

Preis und Lieferzeit: Bitte klicken


This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
Chapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM) Chapter 2.OnlineKALI: Online Vulnerability Scanner Chapter 3.Towards an AI-Chatbot driven Advanced Digital Locker Chapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environment Chapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment Chapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm Chapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance Computing Chapter 9.A Novel Approach of Image Steganography with Encoding and Location Selection Chapter 10.Image Encryption using Pseudorandom Permutation Chapter 11.Authentication of Diffie-Hellman Protocol against Man- in-the-Middle Attack Using Cryptographically Secure CRC Chapter 12.Analysis on Data Hiding In Images Using Different Image Steganography Approaches Chapter 13.Multiple RGB Image Steganography using Arnold and Discrete Cosine Transformation Chapter 14.Brain-Computer Interface Based Fear Detection: A Self Defense Mechanism Chapter 15.Modelling and Simulation of Proton Exchange Membrane Fuel Cell for Stand-Alone System Chapter 16.Hardware Realization of Power Adaptation Technique for Cognitive Radio Sensor Node Chapter 17.Driven by the need for a reliable and cost effective LED driver Chapter 18.SGSQoT: A Community based Trust Management Scheme in Internet of Things Chapter 19.A novel trust evaluation model based on data freshness in WBAN Chapter 20.CREnS: A Convolutional Coder Based Encryption Algorithm for Tiny Embedded Cognitive Radio Sensor Node Chapter 21.Bilingual machine translation: English to Bengali Chapter 22.Comparison of Different Classification Techniques Using Different Datasets Chapter 23.An Algorithmic Approach for Generating Quantum Ternary Superposition Operators and Related Performance Measures Chapter 24.A Survey on Collaborative Filtering: Tasks, Approaches and Applications Chapter 25.Feature subset selection of semi-supervised data: An Intuitionistic Fuzzy-Rough set based concept Chapter 26.An efficient Indoor Occupancy Detection System using Artificial Neural Network Chapter 27.Real-time Facial Recognition using Deep Learning and Local Binary Patterns Chapter 28.Hepatocellular Carcinoma Survival Prediction Using Deep Neural Network Chapter 29.Detection and Retrieval of colored object from a Live Video Stream with Mutual Information Chapter 30.A Machine Learning Framework for Recognizing Hand Written Digits Using Convexity Based Feature Vector Encoding Chapter 31.A Secure Framework for IoT-Based Healthcare System Chapter 32.SMART IRRIGATION: IOT Based Irrigation Monitoring System Chapter 33.Secure data transmission beyond Tier 1 of medical body sensor network Chapter 34.Multi-Target Based Cursor Movement in Brain Computer Interface using CLIQUE Clustering Chapter 35.Data Mining in High Performance Computing: A Survey of Related Algorithms Chapter 36.Personalized Product Recommendation Using Aspect Based Opinion Mining of Reviews Chapter 37.Quantitative Rainfall Prediction: Deep Neural Network based approach Chapter 38.Prediction of Benzene Concentration of Air in Urban Area Using Deep Neural Network Chapter 39.Rough Set Based Feature Subset Selection Technique using Jaccard´s Similarity Index Chapter 40.An Approach towards Development of a Predictive Model for Female Kidnapping in India using R Programming