LEADER 04189nam 22006255 450 001 9910842491103321 005 20240426003328.0 010 $a9789819998111 010 $a9819998115 024 7 $a10.1007/978-981-99-9811-1 035 $a(MiAaPQ)EBC31209106 035 $a(Au-PeEL)EBL31209106 035 $a(DE-He213)978-981-99-9811-1 035 $a(CKB)30864437400041 035 $a(OCoLC)1427062566 035 $a(EXLCZ)9930864437400041 100 $a20240311d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security and Digital Forensics $eSelect Proceedings of the International Conference, ReDCySec 2023 /$fedited by Nihar Ranjan Roy, Sudeep Tanwar, Usha Batra 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (654 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v896 311 08$a9789819998104 311 08$a9819998107 327 $aA Modest Approach Toward Cloud Security Hygiene -- A Survey on Path Key Establishment -- Credit Card Fraud Detection using ML Techniques -- Vulnerabilities in Smart contracts of Decentralized Blockchain -- Object Detection using TensorFlow 2 and Amazon Sage Maker -- Multi-Key Fully Homomorphic Encryption Scheme Over Integers -- Hybrid Lightweight Cryptography using AES and ECC for IoT Security -- A Survey: Analysis of Existing Hybrid Cryptographic Techniques -- Cloud based Integrated Real-Time Twitter Grievance Redressal With AWS EC2 and RDS using Machine Learning Approach for Enhanced Security -- Blockchain Based Public Distribution System -- Security Flaw in TCP/IP and Proposed Measures -- Identity Based Designated Verifier Proxy Signature scheme and its Application to Health Care -- Detection of Phishing Link using different Machine Learning Techniques -- Categorizing Tracing Techniques for Network Forensics -- Cloud-Based Object Detection Model using Amazon Rekognition -- Orphanage Channelization System Using Blockchain Technology -- A Review on Quantum key Distribution Protocols, Challenges and Its Applications -- Static Analysis Approach of Malware using Machine Learning -- Chatbot based android application towards security using FCM -- Ensemble Deep Model for Hate Speech Detection -- Accuracy Enhancement For Intrusion Detection Systems Using LSTM Approach -- Cyber Attack Detection Using Machine Learning Technique -- An Investigative study on Security Aspects and Authentication Schemes for Internet of Vehicles. 330 $aThe book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v896 606 $aData protection 606 $aTelecommunication 606 $aForensic sciences 606 $aData and Information Security 606 $aCommunications Engineering, Networks 606 $aForensic Science 615 0$aData protection. 615 0$aTelecommunication. 615 0$aForensic sciences. 615 14$aData and Information Security. 615 24$aCommunications Engineering, Networks. 615 24$aForensic Science. 676 $a005.8 700 $aRoy$b Nihar Ranjan$01733096 701 $aTanwar$b Sudeep$0942571 701 $aBatra$b Usha$01733097 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910842491103321 996 $aCyber Security and Digital Forensics$94148133 997 $aUNINA