LEADER 12825nam 22008535 450 001 9910644266803321 005 20230608191152.0 010 $a3-031-23095-7 024 7 $a10.1007/978-3-031-23095-0 035 $a(MiAaPQ)EBC7175605 035 $a(Au-PeEL)EBL7175605 035 $a(CKB)25994381500041 035 $a(DE-He213)978-3-031-23095-0 035 $a(PPN)267807880 035 $a(EXLCZ)9925994381500041 100 $a20230110d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvancements in Smart Computing and Information Security $eFirst International Conference, ASCIS 2022, Rajkot, India, November 24?26, 2022, Revised Selected Papers, Part II /$fedited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (315 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1760 311 08$aPrint version: Rajagopal, Sridaran Advancements in Smart Computing and Information Security Cham : Springer,c2023 9783031230943 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR & -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References. 327 $aEXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature. 327 $a7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security. 327 $a4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications. 327 $a1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture. 327 $a4 Results and Discussion. 330 $aThis two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022. The 37 full papers and 19 short papers presented were thoroughly reviewed and selected from the 206 submissions. The papers are organized in topical sections on artificial intelligence; smart computing; cyber security; industry. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1760 606 $aArtificial intelligence 606 $aComputer networks 606 $aComputer systems 606 $aCoding theory 606 $aInformation theory 606 $aApplication software 606 $aData protection 606 $aArtificial Intelligence 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aCoding and Information Theory 606 $aComputer and Information Systems Applications 606 $aData and Information Security 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 0$aComputer systems. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aApplication software. 615 0$aData protection. 615 14$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aCoding and Information Theory. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 676 $a330 676 $a006.3 702 $aRajagopal$b Sridaran 702 $aFaruki$b Parvez 702 $aPopat$b Kalpesh 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910644266803321 996 $aAdvancements in smart computing and information security$93364147 997 $aUNINA