Cyber Security -

Cyber Security (eBook)

Proceedings of CSI 2015
eBook Download: PDF
2018 | 1st ed. 2018
XXIII, 505 Seiten
Springer Singapore (Verlag)
978-981-10-8536-9 (ISBN)
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.

Prof. M. U. Bokhari is working as a Professor at Department of Computer Science, Aligarh Muslim University (AMU), Aligarh. He has published more than 110 research papers in reputed journals and conference proceedings. He has also authored five books on different fields of computer science. His current research interests include requirement engineering, cryptography, software reliability, wireless network security, information retrieval, soft computing, adaptive multimodal retrieval, E-learning and databases.

Dr. Namrata Agrawal is working as a Professor at National Institute of Financial Management (NIFM), an Institute of the Ministry of Finance, Government of India. She has formerly been a member of the MMNIT faculty at Allahabad. She has more than 25 years of teaching, research and consultancy experience. She has published more than 25 papers in national and international journals. She has presented 40 papers at national and international conferences and received the Best Paper Award at an international conference organized by the University of Maryland (ES), USA. She has also authored many best-selling books.

Dr. Dharmender Saini is working as the Principal and a Professor at the Department of Computer Science and Engineering at Bharati Vidyapeeth's College of Engineering (BVCOE), New Delhi. He has 8 years of industry experience in the field of patent research and 8 years of academic experience. He is also a registered Indian patent agent, principal investigator with DESIDOC, DRDO, and in a data mining project and a consultant in the field of patent research.

This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.

Prof. M. U. Bokhari is working as a Professor at Department of Computer Science, Aligarh Muslim University (AMU), Aligarh. He has published more than 110 research papers in reputed journals and conference proceedings. He has also authored five books on different fields of computer science. His current research interests include requirement engineering, cryptography, software reliability, wireless network security, information retrieval, soft computing, adaptive multimodal retrieval, E-learning and databases.Dr. Namrata Agrawal is working as a Professor at National Institute of Financial Management (NIFM), an Institute of the Ministry of Finance, Government of India. She has formerly been a member of the MMNIT faculty at Allahabad. She has more than 25 years of teaching, research and consultancy experience. She has published more than 25 papers in national and international journals. She has presented 40 papers at national and international conferences and received the Best Paper Award at an international conference organized by the University of Maryland (ES), USA. She has also authored many best-selling books.Dr. Dharmender Saini is working as the Principal and a Professor at the Department of Computer Science and Engineering at Bharati Vidyapeeth’s College of Engineering (BVCOE), New Delhi. He has 8 years of industry experience in the field of patent research and 8 years of academic experience. He is also a registered Indian patent agent, principal investigator with DESIDOC, DRDO, and in a data mining project and a consultant in the field of patent research.

Privacy Protection Through Hiding Location Coordinates Using Geometric Transformation Techniques in Location Based Services Enabled Mobiles.- Advanced RSA Cryptographic Algorithm for Improving Data Security.- Different Security Mechanisms in Two Factor Authentication for Collaborative Computing Environment.- Changing Trend in Network Security Measures: A Review.- An Improved RED Algorithm with Input Sensitivity.- Security Attacks in Wireless Sensor Networks: A Survey.- Symmetric Key Encryption Technique: A Cellular Automata Based Approach.- A Comparative study on Lightweight Cryptography.- GPS Hash Table Based Location Identifier Algorithm For Security and Integrity Against Vampire Attacks.- Data Security Model in Cloud Computing Environment.- Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud Based Environment.- DNA Based Cryptography for Security in Wireless Sensor Networks.- Privacy Preservation Using Various Anonymity Models.- A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks.- An Advanced Dynamic Authentic Security Method for Cloud Computing.- Security in CryptDB Using Fine Grained Access Controls with ECDHE-ZeroVi’s Framework.- Mitigating Cloud Security Threats Using Public Key Infrastructure.- Analysis and Impact of Different Mechanisms of Defending Pass the Hash Attacks.- Data Security and Encryption Technique for Cloud Storage.- Fine Grained Access Control and Secured Data Sharing in Cloud Computing.- Comparative Study of Security Risk in Social Networking and Awareness to Individual.- A Key Based Spiral Approach for DNA Cryptography.- Permission-Set Based Detection and Analysis of Android Malware.- Three Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.- Digital Security an Enigma.- ICMP Flood Attacks: A Vulnerability Analysis.- Statistical Approach Using Meta Features for Android Malware Detection System.- Composite Email Features for Spam Identification.- Role of Multiple Encryption in Biometric Devices.- Buffer Overflow and SQL Injection: To Remotely Attack and Access Information.- Prime Numbers: Foundation of Cryptography.- Steganography: A Survey.- Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad-hoc Networks.- Hardware Trojans: An Austere Menace Ahead.- Cyber Security for Supervisory Control and Data Acquisition.- k Barrier Coverage Based Intrusion Detection for Wireless Sensor Networks.- Performance Analysis of Vulnerability Detection Scanners for Web Systems.- Performance Evaluation of Multicast Source Authentication Scheme.- Design and Implementation of a Secure Hierarchical Trust Model for PKI.- Encryption and Decryption Technique Using Java.- Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment.- Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence.- A Robust Server-Side JavaScript Feature Injection-Based Design for JSP Web Applications Against XSS Vulnerabilities.- PHISH-SAFE: URL Features Based Phishing Detection System Using Machine Learning.- Semantic Security for Sharing Computing Knowledge/Information.- Paradigmatic Approach to Cloud Security: Challenges and Remedies.- The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm.- Gaussian Tendencies in Data Flow in Communication Links.

Erscheint lt. Verlag 27.4.2018
Reihe/Serie Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Zusatzinfo XXIII, 505 p. 191 illus., 117 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Recht / Steuern Strafrecht Kriminologie
Sozialwissenschaften Politik / Verwaltung
Schlagworte CSI 2015 • cybercrime • Digital Life • Digital Security • Internet Security • Phishing
ISBN-10 981-10-8536-6 / 9811085366
ISBN-13 978-981-10-8536-9 / 9789811085369
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 15,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99