20%
139.90
CHF111.90
Download est disponible immédiatement
This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
Auteur
Mohuya Chakraborty presently holds the post of professor and head of the department of Information Technology, Institute of Engineering & Management (IEM), Kolkata. She also holds the post of head of Human Resource Development Centre, IEM. She has done B.Tech and M. Tech from the Institute of Radio Physics and Electronics, Calcutta University in the year 1994 and 2000 respectively and PhD (Engg.) in the field of Mobile Computing from Jadavpur University in 2007. She is the recepient of prestigious Paresh Lal Dhar Bhowmik Award. She is the member of editorial board of several International journals. She has published 3 patents and over 80 research papers in reputed International journals and conferences. She has handled many research projects funded by the DST, AICTE, CSIR and NRDC, and has published a number of papers in high-impact journals. Her research areas include network security, cognitive radio, brain computer interface, parallel computing etc. She is a member of IEEE Communication Society, IEEE Computer Society and IEEE Computational Intelligence Society as well as the faculty adviser of IEEE Communication Society and IEEE Computational Intelligence Student Branch Chapters of IEM , Kolkata Section.
Satyajit Chakrabarti is Pro-Vice Chancellor, University of Engineering & Management, Kolkata and Jaipur Campus, India and Director of Institute of Engineering & Management, IEM. As the Director of one of the most reputed organizations in Engineering & Management in Eastern India, he launched a PGDM Programme to run AICTE approved Management courses, Toppers Academy to train students for certificate courses, and Software Development in the field of ERP solutions. Dr. Chakrabarti was Project Manager in TELUS, Vancouver, Canada from February 2006 to September 2009, where he was intensively involved in planning, execution, monitoring, communicating with stakeholders, negotiating with vendors and cross-functional teams, and motivating members. He managed a team of 50 employees and projects with a combined budget of $3 million.
Valentina E. Balas is currently an Associate Professor at the Department of Automatics and Applied Software at the Faculty of Engineering, University Aurel Vlaicu Arad (Romania). She holds a PhD in Applied Electronics and Telecommunications from the Polytechnic University of Timisoara. She is the author of more than 160 research papers in refereed journals and international conferences. Her main research interests are in Intelligent Systems, Fuzzy Control, Soft Computing, Smart Sensors, Information Fusion, Modeling and Simulation. She is Editor-in-Chief of the International Journal of Advanced Intelligence Paradigms (IJAIP), an editorial board member of several national and international journals and an expert evaluator for various national and international projects. She is a member of EUSFLAT, ACM and the IEEE, TC Fuzzy Systems (IEEE CIS), TC Emergent Technologies (IEEE CIS), TC Soft Computing (IEEE SMCS) and IFAC's TC 3.2 Computational Intelligence in Control.
J.K. Mandal received his M.Sc. in Physics from Jadavpur University, Kolkata, West Bengal in 1986 and his M.Tech. in Computer Science from the University of Calcutta. Prof. Mandal was awarded his Ph.D. in Computer Science and Engineering by the Jadavpur University in 2000. Presently, he is working as a Professor of Computer Science and Engineering and former Dean, Faculty of Engineering, Technology and Management at Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as a Lecturer at NERIST, Arunachal Pradesh in September 1988. With 28 years of teaching and research experience, his major research areas include coding theory, data and network security, remote sensing and GIS-based applications, data compression, error correction and visual cryptography. He has been a member of the Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow Member of IETE since 2012, as well as Honorary Chairman of the CSI Kolkata Chapter. He has chaired more than 30 sessions in various international conferences and delivered more than 50 expert/invited lectures in the past 5 years. He has acted as program chair for several international conferences and edited more than 15 volumes of proceedings from Springer Series, Science Direct etc. He is a reviewer of various international journals and conferences. He has over 360 articles and 6 published books to his credit.
Contenu
Chapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM)Chapter 2.OnlineKALI: Online Vulnerability ScannerChapter 3.Towards an AI-Chatbot driven Advanced Digital LockerChapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environmentChapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing EnvironmentChapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server EnvironmentChapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging AlgorithmChapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance ComputingChapter 9.A Novel Approach of Image Steganography with Encoding and Location SelectionChapter 10.Image Encryption using Pseudorandom PermutationChapter 11.Authentication of Diffie-Hellman Protocol against Man in-the-Middle Attack Using Cryptographically Secure CRCChapter 12.Analysis on Data Hiding In Images Using Different Image Steganography ApproachesChapter 13.Multiple RGB Image Steganography using Arnold and Discrete Cosine TransformationChapter 14.Brain-Computer Interface Based Fear Detection: A Self Defense MechanismChapter 15.Modelling and Simulation of Proton Exchange Membrane Fuel Cell for Stand-Alone SystemChapter 16.Hardware Realization of Power Adaptation Technique for Cognitive Radio Sensor NodeChapter 17.Driven by the need for a reliable and cost effective LED driverChapter 18.SGSQoT: A Community based Trust Management Scheme in Internet of ThingsChapter 19.A novel trust evaluation model based on data freshness in WBANChapter 20.CREnS: A Convolutional Coder Based Encryption Algorithm for Tiny Embedded Cognitive Radio Sensor NodeChapter 21.Bilingual machine translation: English to BengaliChapter 22.Comparison of Different Classification Techniques Using Different DatasetsChapter 23.An Algorithmic Approach for Generating Quantum Ternary Superposition Operators and Related Performance MeasuresChapter 24.A Survey on Collaborative Filtering: Tasks, Approaches and ApplicationsChapter 25.Feature subset selection of semi-supervised data: An Intuitionistic Fuzzy-Rough set based conceptChapter 26.An efficient Indoor Occupancy Detection System using Artificial Neural NetworkChapter 27.Real-time Facial Recognition using Deep Learning and Local Binary PatternsChapter 28.Hepatocellular Carcinoma Survival Prediction Using Deep Neural NetworkChapter 29.Detection and Retrieval of colored object from a Live Video Stream with Mutual InformationChapter 30.A Machine Learning Framework for Recognizing Hand Written Digits Using Convexity Based Feat…