2018 6th International Symposium on Digital Forensic and Security (ISDFS)


Book Description

ISDFS provides a platform for researchers and experts in academia, industry and government to exchange ideas and recent developments in digital forensics and security After several successful events, the sixth ISDFS conference will continue to promote and disseminate knowledge concerning several topics and technologies related to Digital Forensics and Security Special sessions, workshops, tutorials, keynotes, panel discussions, poster and oral presentations will be included in the symposium program Topics within the scope of the symposium include, but are not limited to, the following areas Digital Forensics Data Privacy Cryptography Information Security




Proceedings of Third International Conference on Sustainable Computing


Book Description

The book includes a selection of the best papers presented at the Third International Conference on Sustainable Computing (SUSCOM 2021), held in Jaipur, India, during 19 – 20 March 2021. It covers topics like Internet of things (IoT); artificial system of security; smart storage and knowledge retrieval using data cloud; intelligent transport management; intelligent cognitive and bio-inspired computing and management science. The book is useful for peoples from academia, government bodies, healthcare and industry to discuss their future scope.




Digital Forensics and Cyber Crime


Book Description

This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022. The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.




Proceedings of International Conference on Machine Intelligence and Data Science Applications


Book Description

This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, on September 4 and 5, 2020. The book starts by addressing the algorithmic aspect of machine intelligence which includes the framework and optimization of various states of algorithms. Variety of papers related to wide applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, and speech and gesture analysis have been included with upfront details. The book concludes with interdisciplinary applications like legal, health care, smart society, cyber physical system and smart agriculture. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.




Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023


Book Description

This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world’s attention and has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. Most of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, network intrusion, and spam email detection. Similar trends of increasing AI applications are consistent with the current research and market trends in cybersecurity and other fields. We divided this book into two parts; the first is focused on malicious activity detection using AI, whereas the second groups AI applications to tackle a selection of cybersecurity problems. This book is suitable for cybersecurity researchers, practitioners, enthusiasts, as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity. Prior exposure to basic machine learning concepts is preferable, but not necessary.




Digital Cities Roadmap


Book Description

DIGITAL CITIES ROADMAP This book details applications of technology to efficient digital city infrastructure and its planning, including smart buildings. Rapid urbanization, demographic changes, environmental changes, and new technologies are changing the views of urban leaders on sustainability, as well as creating and providing public services to tackle these new dynamics. Sustainable development is an objective by which the processes of planning, implementing projects, and development is aimed at meeting the needs of modern communities without compromising the potential of future generations. The advent of Smart Cities is the answer to these problems. Digital Cities Roadmap provides an in-depth analysis of design technologies that lay a solid foundation for sustainable buildings. The book also highlights smart automation technologies that help save energy, as well as various performance indicators needed to make construction easier. The book aims to create a strong research community, to have a deep understanding and the latest knowledge in the field of energy and comfort, to offer solid ideas in the nearby future for sustainable and resilient buildings. These buildings will help the city grow as a smart city. The smart city has also a focus on low energy consumption, renewable energy, and a small carbon footprint. Audience The information provided in this book will be of value to researchers, academicians and industry professionals interested in IoT-based architecture and sustainable buildings, energy efficiency and various tools and methods used to develop green technologies for construction in smart cities.




Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing


Book Description

This book includes selected papers presented at International Conference on Computational Intelligence, Data Science and Cloud Computing (IEM-ICDC) 2020, organized by the Department of Information Technology, Institute of Engineering & Management, Kolkata, India, during 25-27 September 2020. It presents substantial new research findings about AI and robotics, image processing and NLP, cloud computing and big data analytics as well as in cyber security, blockchain and IoT, and various allied fields. The book serves as a reference resource for researchers and practitioners in academia and industry.




Cross-Site Scripting Attacks


Book Description

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security.




Bioinformatics and Medical Applications


Book Description

BIOINFORMATICS AND MEDICAL APPLICATIONS The main topics addressed in this book are big data analytics problems in bioinformatics research such as microarray data analysis, sequence analysis, genomics-based analytics, disease network analysis, techniques for big data analytics, and health information technology. Bioinformatics and Medical Applications: Big Data Using Deep Learning Algorithms analyses massive biological datasets using computational approaches and the latest cutting-edge technologies to capture and interpret biological data. The book delivers various bioinformatics computational methods used to identify diseases at an early stage by assembling cutting-edge resources into a single collection designed to enlighten the reader on topics focusing on computer science, mathematics, and biology. In modern biology and medicine, bioinformatics is critical for data management. This book explains the bioinformatician’s important tools and examines how they are used to evaluate biological data and advance disease knowledge. The editors have curated a distinguished group of perceptive and concise chapters that presents the current state of medical treatments and systems and offers emerging solutions for a more personalized approach to healthcare. Applying deep learning techniques for data-driven solutions in health information allows automated analysis whose method can be more advantageous in supporting the problems arising from medical and health-related information. Audience The primary audience for the book includes specialists, researchers, postgraduates, designers, experts, and engineers, who are occupied with biometric research and security-related issues.