Vai al contenuto principale della pagina

Intelligent Systems Design and Applications : Information and Network Security, Volume 3



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Abraham Ajith Visualizza persona
Titolo: Intelligent Systems Design and Applications : Information and Network Security, Volume 3 Visualizza cluster
Pubblicazione: Cham : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (497 pages)
Altri autori: PllanaSabri  
HanneThomas  
SiarryPatrick  
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Misdirection Attack in Wireless Sensor Network Using Threshold Method -- 1 Introduction -- 1.1 Generic Security Requirements in a WSN -- 1.2 Types of Attacks in WSN -- 1.3 Misdirection Attack -- 2 Literature Review -- 3 Research Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Blockchain for Data Traceability in the Agricultural Sector -- 1 Introduction -- 2 Related Work -- 3 Blockchain Overview -- 3.1 Blockchain -- 3.2 Ethereum -- 4 Methodology -- 4.1 Choice of the Blockchain -- 4.2 Adaptability to Low Consumption Systems -- 5 Results -- 5.1 Application Development -- 5.2 Implementation -- 6 Disccusion and Future Work -- 6.1 Advantages and Qualities of the Approach -- 6.2 Deficiencies and Future Work -- 7 Conclusion -- References -- Detection of Fake URLs Using Deep LSTM Architecture over Social Media -- 1 Introduction -- 1.1 Structure of URL -- 2 Background and Related Work -- 3 Data Collection -- 4 Fake URL Detection System -- 4.1 Ensemble Methods -- 4.2 Long-Short Term Memory (LSTM) -- 5 Experimental Evaluation -- 5.1 Results -- 6 Conclusion and Future Scope -- References -- Leveraging Blockchain for Secure Water Meter Reading -- 1 Introduction -- 2 Related Works -- 2.1 Blockchain -- 2.2 Blockchain Applications -- 2.3 Blockchain for Water Monitoring -- 3 Method -- 3.1 Application Architecture -- 3.2 Watermeter Reading Application -- 3.3 Blockchain Integration -- 4 Results -- 4.1 Water Meter Reading Process -- 4.2 Application Realization -- 5 Discussion -- 6 Conclusion -- References -- A Hybrid Differential-Evolution-Based Approach to the Sensor Network Localisation Problem -- 1 Introduction -- 2 Related Work -- 3 The Sensor Network Localisation Problem -- 3.1 Formulation as a Least Squares Problem -- 4 Methods -- 5 Numerical Experiments -- 6 Conclusion -- References.
A Review on Physical Abuse Detection Techniques Using Video Surveillance Systems -- 1 Introduction -- 2 Literature Review -- 3 Conclusion -- References -- Detection of Suspicious Activities at Hypervisor in Cloud Computing: A Brief Study -- 1 Introduction -- 2 Literature Survey -- 2.1 Hypervisor Attacks and Defenses -- 2.2 Security Analysis -- 3 Conclusion -- References -- A Simple Genetic Algorithm for the Maximum Min-Sum Dispersion Problem (Max-MinSum DP) and New Node Similarity-Based Variants -- 1 Introduction -- 2 Problem Formulation and Related Work -- 3 DP-sGA - The Proposed Genetic Algorithm -- 4 Numerical Experiments -- 4.1 Benchmarks -- 4.2 Parameter Tuning -- 4.3 Comparisons with Other Methods -- 4.4 Node Similarity-Based Dispersion Problem -- 5 Conclusion -- References -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- 1 Introduction -- 2 Threat Modeling -- 2.1 Threat Modeling Process -- 2.2 Threat Models - STRIDE, PASTA and DREAD -- 3 Analysis of Threat Modeling According to Key Criteria -- 4 Conclusion and Future Work -- References -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and Its Legal and Ethical Implications -- 1 Introduction -- 2 Related Work -- 2.1 Threat of Deepfake to Facial Evidence Verification Techniques -- 2.2 Previous Studies on Deepfake Detection Techniques -- 2.3 Existing Methods for Facial Evidence Verification in Criminal Justice -- 2.4 Comparison of Existing Methods with the Proposed System -- 3 Implementation Method -- 3.1 Dataset Creation, Feature Extraction, and Representation -- 3.2 System Prototype -- 4 Experiment -- 5 Discussion -- 5.1 Important Findings on the Proposed System's Method -- 5.2 Legal Challenges and Implications of the Proposed System -- 5.3 Ethical Considerations in the Usage of the Proposed System -- 6 Conclusions.
References -- A Methodology to Evaluate the Security of Block Ciphers Against Neurocryptanalytic Attacks -- 1 Introduction -- 2 Cryptography and Cryptanalysis -- 3 Block Ciphers -- 4 Methodology -- 4.1 Data: Source and Handling -- 4.2 Neural Network Settings -- 4.3 Evaluation Metrics -- 5 Experiments and Analysis -- 5.1 Comparison Among Database Sizes -- 5.2 Comparison Among Key Sizes -- 6 Conclusions -- References -- Enhancing Positivity on Social Media: A Review of Offensive Comment Classification -- 1 Introduction -- 2 Offensive Language Review -- 2.1 Forms of Offensive Language -- 2.2 Data Collection -- 2.3 Data Sources -- 2.4 Text Normalization -- 3 Related Work -- 3.1 Features Extraction Technique -- 3.2 Machine Learning-Based Approaches -- 3.3 Deep Learning-Based Approaches -- 3.4 Transformer Model-Based Approaches -- 4 Discussion -- 5 Conclusion -- References -- Object Recognition and Tracking for Enhanced Security Using Computer Vision -- 1 Introduction -- 2 Background Details and Related Work -- 3 Proposed Approach -- 4 Implementation of the System -- 5 Conclusions -- References -- Improving the Cryptocurrency Price Prediction Using Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Exploring Cryptocurrencies -- 4 Proposed Methodology -- 4.1 Data Collection -- 4.2 Data Preprocessing -- 4.3 Feature Selection -- 4.4 Data Splitting -- 4.5 Model Architecture -- 5 Metric Analysis -- 6 Result Analysis -- 7 Conclusion -- 8 Future Works -- References -- Analysis of Privacy Preservation on Mobile Ad-Hoc Networks -- 1 Introduction -- 2 Literature Survey -- 3 Attack Strategies to Affect Privacy in MANET -- 3.1 Breaching of Confidentiality -- 3.2 Breaching of Integrity -- 3.3 Breaching of Availability -- 3.4 Breaching of Authentication -- 4 Applied Privacy-Preservation Techniques on MANET -- 5 Conclusion -- References.
Multi Face Detection Based Attendance System -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Arabic Hate Speech Detection on Social Media Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Machine Learning -- 2.2 Deep Learning -- 3 Proposed Approach -- 3.1 Data Preprocessing -- 3.2 Features Extraction -- 4 Models -- 4.1 Logistic Regression -- 4.2 Linear Support Vector Classification -- 4.3 The Bidirectional Long-Short-Term Memory -- 5 Result and Discussions -- 5.1 Dataset Description -- 5.2 Machine Learning Models Results -- 5.3 Deep Learning Model Result: BI-LSTM -- 5.4 Comparison with State of the Art Approaches for Arabic Languages -- 6 Conclusion -- References -- Secure Ranked Search over Encrypted Cloud Data -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Proposed Methodology -- 5 Efficiency -- 6 Conclusions and Future Work -- References -- Web Application Exploitation and Account Takeover: A Comprehensive Study of Techniques and Mitigation Strategies -- 1 Introduction -- 2 Background -- 2.1 Web Vulnerabilities -- 2.2 Account Takeover -- 3 Techniques and Scenarios -- 3.1 Exploring the Impact of Unicode Mapping Collision on Account Takeover Attacks -- 3.2 Addressing Pre-account Takeover Threats in OAuth-Enabled Applications -- 3.3 Exploiting Host Headers for Account Takeover Attacks -- 3.4 Hijacking the Response: Understanding and Mitigating Response Manipulation Attacks -- 3.5 Broken Authentication Vulnerabilities in Reset Password and Email Change Features -- 4 Conclusion -- References -- Secured Encryption Technique in S-Box Using Fermat Encoding -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Illustration -- 5 Performance Analysis -- 6 Conclusion -- References.
Enhanced Gaining-Sharing Knowledge Optimization Algorithm for 3D Compression of Intrusion Detection Dataset -- 1 Introduction -- 2 Gaining-Sharing Knowledge Optimization Algorithm -- 3 EGSK-CIDD Model -- 3.1 Description of the KDDCup99 Dataset -- 3.2 Preprocessing the Datasets -- 3.3 Modularity of GSK -- 3.4 Records Filtering Process -- 3.5 Multilayer Perceptron Implementation -- 4 Implementation of the EGSK-CIDD Model -- 5 Conclusion -- References -- Uses of Blockchain in Internet of Medical Things: A Systematic Review -- 1 Introduction -- 2 Literature Review -- 2.1 Authentication Topic Utilize Blockchain -- 2.2 Intrusion Detection in Blockchain -- 2.3 Federate and Deep Learning Issue -- 2.4 Task Scheduling -- 3 Challenges and Solution by Using Blockchain in IoMT -- 4 Discussion -- 5 Conclusions -- References -- Secured Banking System Using Decentralized Approach - Block Chain -- 1 Introduction -- 1.1 Consensus Mechanism -- 1.2 Block Validation -- 1.3 Transactions -- 1.4 Block Creation -- 1.5 Proof of Work -- 2 Related Work -- 3 Proposed Work -- 3.1  Functional Modules Design and Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- A Multi-batch Differential Binary Motion Image and Deep Hashing Network for Human Action Recognition -- 1 Introduction -- 2 Methodology -- 2.1 Multiple Batches of Differential Binary Motion History -- 2.2 Description and Encoding of Features -- 2.3 Handcrafted Features: DBMH/HOG -- 2.4 Spatio-Temporal Deep AE Pattern (STDAEP) -- 3 Evaluation and Results -- 4 Conclusion -- References -- Intelligent Traffic Sign Detection and Recognition Using Computer Vision -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation and Results -- 5 Conclusion -- References -- Digital Guardians: Enhancing Women's Security with Artificial Intelligence and IoT -- 1 Introduction.
2 Related Work.
Titolo autorizzato: Intelligent Systems Design and Applications  Visualizza cluster
ISBN: 9783031646508
9783031646492
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910874680603321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Series