Proceedings of International Ethical Hacking Conference 2018 : eHaCON 2018, Kolkata, India /: eHaCON 2018, Kolkata, India. ([2019])
- Record Type:
- Book
- Title:
- Proceedings of International Ethical Hacking Conference 2018 : eHaCON 2018, Kolkata, India /: eHaCON 2018, Kolkata, India. ([2019])
- Main Title:
- Proceedings of International Ethical Hacking Conference 2018 : eHaCON 2018, Kolkata, India
- Other Titles:
- EHaCON 2018
- Further Information:
- Note: Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J.K. Mandal, editors.
- Editors:
- Chakraborty, Mohuya
Chakrabarti, Satyajit
Balas, Valentina Emilia
Mandal, Jyotsna Kumar, 1960- - Other Names:
- International Ethical Hacking Conference
- Contents:
- Chapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM)Chapter 2.OnlineKALI: Online Vulnerability ScannerChapter 3.Towards an AI-Chatbot driven Advanced Digital LockerChapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environmentChapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing EnvironmentChapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server EnvironmentChapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging AlgorithmChapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance ComputingChapter 9.A Novel Approach of Image Steganography with Encoding and Location SelectionChapter 10.Image Encryption using Pseudorandom PermutationChapter 11.Authentication of Diffie-Hellman Protocol against Man– in-the-Middle Attack Using Cryptographically Secure CRCChapter 12.Analysis on Data Hiding In Images Using Different Image Steganography ApproachesChapter 13.Multiple RGB Image Steganography using Arnold and Discrete Cosine TransformationChapter 14.Brain-Computer Interface Based Fear Detection: A Self Defense MechanismChapter 15.Modelling and Simulation of Proton Exchange Membrane Fuel Cell for Stand-Alone SystemChapter 16.Hardware Realization of Power Adaptation Technique for Cognitive Radio Sensor NodeChapter 17.Driven by the need for a reliable and costChapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM)Chapter 2.OnlineKALI: Online Vulnerability ScannerChapter 3.Towards an AI-Chatbot driven Advanced Digital LockerChapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environmentChapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing EnvironmentChapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server EnvironmentChapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging AlgorithmChapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance ComputingChapter 9.A Novel Approach of Image Steganography with Encoding and Location SelectionChapter 10.Image Encryption using Pseudorandom PermutationChapter 11.Authentication of Diffie-Hellman Protocol against Man– in-the-Middle Attack Using Cryptographically Secure CRCChapter 12.Analysis on Data Hiding In Images Using Different Image Steganography ApproachesChapter 13.Multiple RGB Image Steganography using Arnold and Discrete Cosine TransformationChapter 14.Brain-Computer Interface Based Fear Detection: A Self Defense MechanismChapter 15.Modelling and Simulation of Proton Exchange Membrane Fuel Cell for Stand-Alone SystemChapter 16.Hardware Realization of Power Adaptation Technique for Cognitive Radio Sensor NodeChapter 17.Driven by the need for a reliable and cost effective LED driverChapter 18.SGSQoT: A Community based Trust Management Scheme in Internet of ThingsChapter 19.A novel trust evaluation model based on data freshness in WBANChapter 20.CREnS: A Convolutional Coder Based Encryption Algorithm for Tiny Embedded Cognitive Radio Sensor NodeChapter 21.Bilingual machine translation: English to BengaliChapter 22.Comparison of Different Classification Techniques Using Different DatasetsChapter 23.An Algorithmic Approach for Generating Quantum Ternary Superposition Operators and Related Performance MeasuresChapter 24.A Survey on Collaborative Filtering: Tasks, Approaches and ApplicationsChapter 25.Feature subset selection of semi-supervised data: An Intuitionistic Fuzzy-Rough set based conceptChapter 26.An efficient Indoor Occupancy Detection System using Artificial Neural NetworkChapter 27.Real-time Facial Recognition using Deep Learning and Local Binary PatternsChapter 28.Hepatocellular Carcinoma Survival Prediction Using Deep Neural NetworkChapter 29.Detection and Retrieval of colored object from a Live Video Stream with Mutual InformationChapter 30.A Machine Learning Framework for Recognizing Hand Written Digits Using Convexity Based Feature Vector EncodingChapter 31.A Secure Framework for IoT-Based Healthcare SystemChapter 32.SMART IRRIGATION: IOT Based Irrigation Monitoring SystemChapter 33.Secure data transmission beyond Tier 1 of medical body sensor networkChapter 34.Multi-Target Based Cursor Movement in Brain Computer Interface using CLIQUE ClusteringChapter 35.Data Mining in High Performance Computing: A Survey of Related AlgorithmsChapter 36.Personalized Product Recommendation Using Aspect Based Opinion Mining of ReviewsChapter 37.Quantitative Rainfall Prediction: Deep Neural Network based approachChapter 38.Prediction of Benzene Concentration of Air in Urban Area Using Deep Neural NetworkChapter 39.Rough Set Based Feature Subset Selection Technique using Jaccard's Similarity IndexChapter 40.An Approach towards Development of a Predictive Model for Female Kidnapping in India using R Programming. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2019
- Copyright Date:
- 2019
- Extent:
- 1 online resource, illustrations (some color)
- Subjects:
- 005.8/3
Engineering
Penetration testing (Computer security) -- Congresses
Telecommunication
Data protection
Data structures (Computer scienc)
COMPUTERS / Security / General
Computers -- Security -- General
Computers -- Information Theory
Computer security
Algorithms & data structures
Technology & Engineering -- Telecommunications
Communications engineering / telecommunications
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9789811315442
9811315442 - Related ISBNs:
- 9789811315435
- Notes:
- Note: Includes bibliographical references and index.
Note: Online resource ; title from PDF title page (EBSCO, viewed October 10, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.337731
- Ingest File:
- 02_335.xml