LEADER 03881nam 22005895 450 001 9910350311703321 005 20251113210242.0 010 $a981-13-1544-2 024 7 $a10.1007/978-981-13-1544-2 035 $a(CKB)4100000006999453 035 $a(MiAaPQ)EBC5540919 035 $a(DE-He213)978-981-13-1544-2 035 $a(PPN)231462689 035 $a(EXLCZ)994100000006999453 100 $a20181004d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of International Ethical Hacking Conference 2018 $eeHaCON 2018, Kolkata, India /$fedited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J. K. Mandal 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (502 pages) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v811 311 08$a981-13-1543-4 327 $aChapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM) -- Chapter 2.OnlineKALI: Online Vulnerability Scanner -- Chapter 3.Towards an AI-Chatbot driven Advanced Digital Locker -- Chapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environment -- Chapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment -- Chapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm -- Chapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance Computing -- Chapter 9.A Novel Approach of Image Steganography with Encoding and Location Selection -- Chapter 10.Image Encryption using Pseudorandom Permutation.-..etc. 330 $aThis book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security. 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v811 606 $aTelecommunication 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCommunications Engineering, Networks 606 $aData and Information Security 606 $aData Structures and Information Theory 615 0$aTelecommunication. 615 0$aData protection. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 14$aCommunications Engineering, Networks. 615 24$aData and Information Security. 615 24$aData Structures and Information Theory. 676 $a005.8092 702 $aChakraborty$b Mohuya$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChakrabarti$b Satyajit$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBalas$b Valentina Emilia$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMandal$b J. K$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910350311703321 996 $aProceedings of International Ethical Hacking Conference 2018$92177651 997 $aUNINA