LEADER 04220nam 22006135 450 001 9910366610003321 005 20251113193049.0 010 $a981-15-0361-3 024 7 $a10.1007/978-981-15-0361-0 035 $a(CKB)4100000009939991 035 $a(MiAaPQ)EBC5987424 035 $a(DE-He213)978-981-15-0361-0 035 $a(PPN)258061847 035 $a(EXLCZ)994100000009939991 100 $a20191129d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of International Ethical Hacking Conference 2019 $eeHaCON 2019, Kolkata, India /$fedited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (261 pages) $cillustrations 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v1065 311 08$a981-15-0360-5 327 $aReview and Comparison of Face Detection Techniques -- Keyword Spotting with Neural Networks used for Image-Classification -- Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras -- Biomedical Image Security using Matrix Manipulation and DNA Encryption -- A study on the issue of blockchain?s energy consumption -- Study on network scanning using machine learning based methods -- Is Blockchain the Future of Supply Chain Management? -- APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain -- Study on S-box Properties of Convolution Coder -- Smart Healthcare Assistance towards on-road Medical Emergency -- A Study on Various Database Models: Relational, Graph and Hybrid Databases -- Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents -- Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET -- A mobile user authentication technique in Global mobility network -- Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol -- Ethical Hacking: Redefining Security in Information System -- Internal Organizational Security -- Securing Air Gapped Systems -- Data Security Techniques based on DNA Encryption. . 330 $aThis book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security. 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v1065 606 $aTelecommunication 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCommunications Engineering, Networks 606 $aData and Information Security 606 $aData Structures and Information Theory 615 0$aTelecommunication. 615 0$aData protection. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 14$aCommunications Engineering, Networks. 615 24$aData and Information Security. 615 24$aData Structures and Information Theory. 676 $a005.8 702 $aChakraborty$b Mohuya$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChakrabarti$b Satyajit$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBalas$b Valentina E$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910366610003321 996 $aProceedings of International Ethical Hacking Conference 2019$92033411 997 $aUNINA