Fr. 184.00

Cyber Security - Proceedings of CSI 2015

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.

List of contents

Privacy Protection Through Hiding Location Coordinates Using Geometric Transformation Techniques in Location Based Services Enabled Mobiles.- Advanced RSA Cryptographic Algorithm for Improving Data Security.- Different Security Mechanisms in Two Factor Authentication for Collaborative Computing Environment.- Changing Trend in Network Security Measures: A Review.- An Improved RED Algorithm with Input Sensitivity.- Security Attacks in Wireless Sensor Networks: A Survey.- Symmetric Key Encryption Technique: A Cellular Automata Based Approach.- A Comparative study on Lightweight Cryptography.- GPS Hash Table Based Location Identifier Algorithm For Security and Integrity Against Vampire Attacks.- Data Security Model in Cloud Computing Environment.- Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud Based Environment.- DNA Based Cryptography for Security in Wireless Sensor Networks.- Privacy Preservation Using Various Anonymity Models.- A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks.- An Advanced Dynamic Authentic Security Method for Cloud Computing.- Security in CryptDB Using Fine Grained Access Controls with ECDHE-ZeroVi's Framework.- Mitigating Cloud Security Threats Using Public Key Infrastructure.- Analysis and Impact of Different Mechanisms of Defending Pass the Hash Attacks.- Data Security and Encryption Technique for Cloud Storage.- Fine Grained Access Control and Secured Data Sharing in Cloud Computing.- Comparative Study of Security Risk in Social Networking and Awareness to Individual.- A Key Based Spiral Approach for DNA Cryptography.- Permission-Set Based Detection and Analysis of Android Malware.- Three Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.- Digital Security an Enigma.- ICMP Flood Attacks: A Vulnerability Analysis.- Statistical Approach Using Meta Features for Android Malware Detection System.- Composite Email Features for Spam Identification.- Role of Multiple Encryption in Biometric Devices.- Buffer Overflow and SQL Injection: To Remotely Attack and Access Information.- Prime Numbers: Foundation of Cryptography.- Steganography: A Survey.- Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad-hoc Networks.- Hardware Trojans: An Austere Menace Ahead.- Cyber Security for Supervisory Control and Data Acquisition.- k Barrier Coverage Based Intrusion Detection for Wireless Sensor Networks.- Performance Analysis of Vulnerability Detection Scanners for Web Systems.- Performance Evaluation of Multicast Source Authentication Scheme.- Design and Implementation of a Secure Hierarchical Trust Model for PKI.- Encryption and Decryption Technique Using Java.- Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment.- Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence.- A Robust Server-Side JavaScript Feature Injection-Based Design for JSP Web Applications Against XSS Vulnerabilities.- PHISH-SAFE: URL Features Based Phishing Detection System Using Machine Learning.- Semantic Security for Sharing Computing Knowledge/Information.- Paradigmatic Approach to Cloud Security: Challenges and Remedies.- The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm.- Gaussian Tendencies in Data Flow in Communication Links.

About the author

Prof. M. U. Bokhari is working as a Professor at Department of Computer Science, Aligarh Muslim University (AMU), Aligarh. He has published more than 110 research papers in reputed journals and conference proceedings. He has also authored five books on different fields of computer science. His current research interests include requirement engineering, cryptography, software reliability, wireless network security, information retrieval, soft computing, adaptive multimodal retrieval, E-learning and databases.

Dr. Namrata Agrawal is working as a Professor at National Institute of Financial Management (NIFM), an Institute of the Ministry of Finance, Government of India. She has formerly been a member of the MMNIT faculty at Allahabad. She has more than 25 years of teaching, research and consultancy experience. She has published more than 25 papers in national and international journals. She has presented 40 papers at national and international conferences andreceived the Best Paper Award at an international conference organized by the University of Maryland (ES), USA. She has also authored many best-selling books.

Dr. Dharmender Saini is working as the Principal and a Professor at the Department of Computer Science and Engineering at Bharati Vidyapeeth’s College of Engineering (BVCOE), New Delhi. He has 8 years of industry experience in the field of patent research and 8 years of academic experience. He is also a registered Indian patent agent, principal investigator with DESIDOC, DRDO, and in a data mining project and a consultant in the field of patent research.

Summary

This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.

Product details

Assisted by Namrat Agrawal (Editor), Namrata Agrawal (Editor), M. U. Bokhari (Editor), Dharmendra Saini (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2018
 
EAN 9789811085352
ISBN 978-981-10-8535-2
No. of pages 505
Dimensions 155 mm x 236 mm x 26 mm
Weight 882 g
Illustrations XXIII, 505 p. 191 illus., 117 illus. in color.
Series Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Advances in Intelligent System
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

C, cybercrime, engineering, Systems and Data Security, Data and Information Security, Crime & criminology, Network Security, Computer security, Coding and Information Theory, Information theory, Coding theory & cryptology, Coding theory, Computer crimes, Computer crime, cybercrime

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.