This completed downloadable of Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018 Kolkata India Mohuya Chakraborty
Instant downloaded Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018 Kolkata India Mohuya Chakraborty pdf docx epub after payment.
Product details:
- ISBN 10: 9811315442
- ISBN 13: 9789811315442
- Author: Mohuya Chakraborty
This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
Table of contents:
Part I. Keynote Talk
Hadamard Modulo Prime Matrices and Their Application in Cryptography: A Survey of Some Recent Works
Part II. Session 1A: Ethical Hacking and Cloud Computing
Social Engineering Attack Detection and Data Protection Model (SEADDPM)
OnlineKALI: Online Vulnerability Scanner
Toward an AI Chatbot-Driven Advanced Digital Locker
A Hybrid Task Scheduling Algorithm for Efficient Task Management in Multi-cloud Environment
An Enhanced Post-migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment
Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment
Part III. Session 1B: Cryptography
Bi-symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm
DNA Cryptography-Based Secured Weather Prediction Model in High-Performance Computing
A Novel Approach of Image Steganography with Encoding and Location Selection
Image Encryption Using Pseudorandom Permutation
Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC
Multiple RGB Image Steganography Using Arnold and Discrete Cosine Transformation
Part IV. Session 2A: Modeling and Simulation
Brain–Computer Interface-Based Fear Detection: A Self-defense Mechanism
Modelling and Simulation of Proton Exchange Membrane Fuel Cell for Stand-Alone System
Hardware Realization of Power Adaptation Technique for Cognitive Radio Sensor Node
Driven by the Need for a Reliable and Cost-Effective LED Driver
Part V. Session 2B: Network Security
SGSQoT: A Community-Based Trust Management Scheme in Internet of Things
A Novel Trust Evaluation Model Based on Data Freshness in WBAN
CREnS: A Convolutional Coder-Based Encryption Algorithm for Tiny Embedded Cognitive Radio Sensor Node
Part VI. Session 2C: Artificial Intelligence
Bilingual Machine Translation: English to Bengali
Comparison of Different Classification Techniques Using Different Datasets
An Algorithmic Approach for Generating Quantum Ternary Superposition Operators and Related Performance Measures
A Survey on Collaborative Filtering: Tasks, Approaches and Applications
Part VII. Session 3A: Artificial Intelligence
Feature Subset Selection of Semi-supervised Data: An Intuitionistic Fuzzy-Rough Set-Based Concept
An Efficient Indoor Occupancy Detection System Using Artificial Neural Network
Real-Time Facial Recognition Using Deep Learning and Local Binary Patterns
Hepatocellular Carcinoma Survival Prediction Using Deep Neural Network
Detection and Retrieval of Colored Object from a Live Video Stream with Mutual Information
A Machine Learning Framework for Recognizing Handwritten Digits Using Convexity-Based Feature Vector Encoding
Part VIII. Session 3B: Internet of Things
A Secure Framework for IoT-Based Healthcare System
Smart Irrigation: IOT-Based Irrigation Monitoring System
Secure Data Transmission Beyond Tier 1 of Medical Body Sensor Network
Multi-target-Based Cursor Movement in Brain-Computer Interface Using CLIQUE Clustering
Part IX. Session 3C: Data Analysis
Data Mining in High-Performance Computing: A Survey of Related Algorithms
Personalized Product Recommendation Using Aspect-Based Opinion Mining of Reviews
Quantitative Rainfall Prediction: Deep Neural Network-Based Approach
Prediction of Benzene Concentration of Air in Urban Area Using Deep Neural Network
Rough Set-Based Feature Subset Selection Technique Using Jaccard’s Similarity Index
An Approach Towards Development of a Predictive Model for Female Kidnapping in India Using R Programming
People also search:
ethics & international affairs
ethical hacking news articles
hague conference on private international law
hague conference on private international law members
international review of information ethics