LEADER 04952nam 22007335 450 001 9910743368003321 005 20251113200035.0 010 $a981-16-3960-4 010 $a981-16-3961-2 010 $a981-16-3961-2 024 7 $a10.1007/978-981-16-3961-6 035 $a(CKB)5360000000049944 035 $a(MiAaPQ)EBC6739116 035 $a(Au-PeEL)EBL6739116 035 $a(OCoLC)1281976425 035 $a(DE-He213)978-981-16-3961-6 035 $a(PPN)258299894 035 $a(EXLCZ)995360000000049944 100 $a20211001d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security and Digital Forensics $eProceedings of ICCSDF 2021 /$fedited by Kavita Khanna, Vania Vieira Estrela, Joel José Puga Coelho Rodrigues 205 $a1st ed. 2022. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2022. 215 $a1 online resource (609 pages) 225 1 $aLecture Notes on Data Engineering and Communications Technologies,$x2367-4520 ;$v73 311 08$a981-16-3960-4 327 $aChapter 1. A systematic approach for analyzing log files based on string matching regular expressions -- Chapter 2. An efficient detection and prevention approach of unknown malicious attack: A novel honeypot approach -- Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare System in Uttarakhand -- Chapter 4. Android Malware Detection using Extreme Learning Machine optimized with Swarm Intelligence -- Chapter 5. Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform -- Chapter 6. Authentication of Digital Media using Reversible Watermarking -- Chapter 7. Automatic Test Case Generation and Fault Tolerant Framework Based on N Version and Recovery Block Mechanism -- Chapter 8. Chatbot to Map Medical Prognosis and Symptoms using Machine Learning -- Chapter 9. Cloud Security: The Future of Data Storage -- Chapter 10. Curbing Criminal Acts on Mobile Phone Network -- Chapter 11. Designing of Fuzzy logic-based Intrusion detection system (FIDS) for detection of Blckhole attack in AODV for MANETs -- Chapter 12. Detection of Phishing Websites Using Classification Algorithms -- Chapter 13. IoT Based Smart Security System for Agriculture Fields -- Chapter 14. Efficient Clustering of Transactional data for Privacy-Preserving Data Publishing -- Chapter 15. Passive Video Forgery Detection Techniques to Detect Copy Move Tampering through Feature Comparison and RANSAC. 330 $aThis book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3?4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime. 410 0$aLecture Notes on Data Engineering and Communications Technologies,$x2367-4520 ;$v73 606 $aTelecommunication 606 $aComputer networks$xSecurity measures 606 $aBlockchains (Databases) 606 $aData protection 606 $aForensic sciences 606 $aCommunications Engineering, Networks 606 $aMobile and Network Security 606 $aBlockchain 606 $aData and Information Security 606 $aForensic Science 615 0$aTelecommunication. 615 0$aComputer networks$xSecurity measures. 615 0$aBlockchains (Databases). 615 0$aData protection. 615 0$aForensic sciences. 615 14$aCommunications Engineering, Networks. 615 24$aMobile and Network Security. 615 24$aBlockchain. 615 24$aData and Information Security. 615 24$aForensic Science. 676 $a005.8 702 $aKhanna$b Kavita 702 $aEstrela$b Vania Vieira 702 $aCoelho Rodrigues$b Joel Jose? Puga 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910743368003321 996 $aCyber security and digital forensics$92818953 997 $aUNINA