Vai al contenuto principale della pagina

Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 2



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Kole Dipak Kumar Visualizza persona
Titolo: Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 2 Visualizza cluster
Pubblicazione: Singapore : , : Springer Singapore Pte. Limited, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (694 pages)
Altri autori: Roy ChowdhuryShubhajit  
BasuSubhadip  
PlewczynskiDariusz  
BhattacharjeeDebotosh  
Nota di contenuto: Intro -- Preface -- Contents -- Editors and Contributors -- Communication Networks, Security, Cloud Computing and IoT -- An Optimal Edge Server Placement Algorithm Based on Glowworm Swarm Optimization Technique -- 1 Introduction -- 2 GSO-Based Edge Server Placement -- 2.1 System Model -- 2.2 Edge Server Placement Algorithm -- 3 Performance Analysis -- 4 Conclusion -- References -- A 6G-Enabled Edge-Assisted Internet of Drone Things Ecosystem for Fire Detection -- 1 Introduction -- 2 Related Research -- 3 Proposed Methodology -- 3.1 The Layered Architecture -- 3.2 Intelligent Detection Modeling -- 4 Results Analysis -- 4.1 Performance Analysis of the IoDT Network -- 4.2 Prediction Results -- 5 Conclusions -- References -- An Automated Secure Smart-Contract Driven KYC Solution -- 1 Introduction -- 1.1 Know-Your-Customer (KYC) -- 1.2 Hyperledger Fabric -- 1.3 Text Extraction Using Machine Learning Technique -- 1.4 Motivation and Contribution -- 2 Related Work -- 3 System Model -- 3.1 Hyperledger Fabric Network -- 3.2 Machine Learning-Based Text Extraction Model -- 4 Flow of a KYC Use Case -- 4.1 Inside the Machine Learning Model -- 4.2 Inside the HLF Network -- 5 KYC Chaincode Methods -- 5.1 OnboardKYC -- 5.2 UpdateKYC -- 5.3 GetKYCData -- 5.4 ExistsKYC -- 6 Implementation -- 6.1 Software Specifications -- 6.2 Hardware Specifications -- 6.3 Experiment Configuration -- 7 Results -- 7.1 Text Extraction Using CRAFT -- 7.2 Onboarding KYC of a New Customer into Blockchain -- 7.3 Updating Record of an Existing Customer -- 7.4 Get/Query KYC Record of a Customer -- 7.5 Operational Cost -- 7.6 Resistant to Impersonation Attacks -- 8 Conclusion and Future Work -- References -- Enhancing popSAD: A New Approach to Shilling Attack Detection in Collaborative Recommenders -- 1 Introduction -- 2 Preliminaries -- 2.1 Attack Model -- 2.2 Attack Types.
3 Related Work -- 4 Proposed Approach -- 5 Experimental Evaluation -- 5.1 Dataset and Experimental Setup -- 5.2 Performance Metrics -- 5.3 Results and Discussion -- 6 Conclusion and Future Work -- References -- Coverless Steganography: A Comprehensive Study on Concealing Data Without a Cover Medium -- 1 Introduction -- 2 Literature Review -- 2.1 Comparisons of Existing Methodology -- 3 Conclusion -- References -- IRS-Assisted Wireless Systems: Phase Setting and BER Analysis -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 System Model -- 3 Proposed Phase Optimization Methods -- 3.1 Maximum Energy-Path (MEP) Method -- 3.2 Mean Phase Shift (MPS) Method -- 3.3 Weighted Phase Shift (WPS) Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Secured Authentication Scheme for E-Healthcare in SIoT Using ECC and Improved Hash Function -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 1.3 Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 4.1 Initialization Step -- 4.2 Registration Step -- 4.3 Login Step and Authentication Step -- 4.4 Password Change Phase -- 5 Results -- 6 Conclusion and Future Work -- References -- Securing Social Internet of Things: Intrusion Detection Models in Collaborative Edge Computing -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem Statement -- 1.3 Objectives of the Study -- 2 Related Work -- 2.1 Collaborative Edge Computing in SIoT -- 2.2 Intrusion Detection Techniques in SIoT -- 2.3 Limitations of Existing Approaches -- 3 Methodology -- 3.1 Feature Extraction and Intrusion Detection Models -- 3.2 Dataset Description -- 4 Experimental Evaluation -- 4.1 Model Experimental Setup -- 4.2 Performance Metrics -- 4.3 Results and Analysis -- 4.4 Comparative Analysis of Model Performance -- 5 Conclusion and Future Work -- References.
Anomaly Detection-Based Resource Autoscaling Mechanism for Fog Computing -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 1.3 Paper Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 5 Experimental Results -- 6 Conclusion -- References -- On Coverage and Connectivity with Reduced Sensing Redundancy Based on Genetic Algorithm -- 1 Introduction -- 2 Related Works -- 3 System Model and Assumption -- 3.1 Coverage Model -- 3.2 Communication Model -- 3.3 Energy Model -- 4 Mathematical Formulation of the Problem -- 5 Proposed Algorithm -- 5.1 Chromosome Representation -- 5.2 Fitness Function -- 6 Experimentation -- 6.1 Experimental Setup -- 6.2 Results and Analysis -- 7 Conclusions and Future Works -- References -- Trust Management Model for Service Delegation in SIoT -- 1 Introduction -- 1.1 Contribution -- 1.2 Paper Organization -- 2 Related Works -- 3 Proposed System -- 3.1 Problem Statement and Objectives -- 3.2 Assumptions and Notations -- 3.3 Trust Management Model -- 3.4 Delegation of Service to More Reliable SP -- 4 Experimental Results and Discussion -- 5 Motivation and Future Directions -- 6 Conclusion -- References -- A Survey on Wireless Sensor Network Routing Performance Optimizing and Security Techniques -- 1 Introduction -- 1.1 WSN -- 2 Literature Review -- 3 Comparative Analysis of Routing Protocol in WSN -- 4 Comparative Analysis of Routing Protocol in WSN Methods Used -- 4.1 Location-Based Routing Protocols (LBRP) -- 4.2 Hierarchical-Based Routing Protocols -- 5 Conclusion -- References -- Parallel Communicating One-Way Reversible Finite Automata System -- 1 Introduction -- 2 Basic Terminology -- 2.1 One-Way Reversible Finite Automata -- 2.2 Parallel Communicating One-Way Reversible Finite Automata System -- 3 Computational Complexity of Parallel Communicating One-Way Reversible Finite Automata System.
4 Conclusion -- References -- Honeypot Deception: A Clever Approach of Web Intrusion Detection and Prevention -- 1 Introduction -- 2 Preliminaries -- 2.1 Honeypot -- 2.2 Web Attack -- 3 Literature Survey -- 4 Proposed Method of Web Intrusion Detection and Prevention Using Honeypot -- 4.1 Honeypot 1.0 -- 4.2 Honeypot 2.0 -- 4.3 Honeypot 3.0 -- 5 Experimental Results and Analysis of the Proposed Honeypot Systems -- 5.1 Honeypot 1.0 -- 5.2 Honeypot 2.0 -- 5.3 Honeypot 3.0 -- 6 Conclusion -- References -- Designing an Optimal Objective Function for Performance Optimization of Mobile Ad-Hoc Networks -- 1 Introduction -- 2 Objective Function Design Strategy -- 3 Challenges of Designing Objective Function -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- A Service Discovery Approach for IoT-Based Application -- 1 Introduction -- 2 Related Work -- 3 Scope of the Work -- 4 Problem Formulation -- 5 Solution Approach -- 5.1 Algorithm I -- 5.2 Algorithm II -- 6 Implementation -- 7 Result -- 7.1 Result: Scenario I -- 7.2 Result: Scenario II -- 7.3 Result: Scenario III -- 8 Conclusion -- References -- Maatran: Revolutionizing Maternal Care Through Remote Monitoring and Risk Prediction -- 1 Introduction -- 2 Literature Review -- 3 Hardware Modules -- 4 Methodology -- 4.1 Hardware -- 4.2 Software -- 4.3 Machine Learning Model -- 5 Results and Discussion -- 5.1 Performance Evaluation of ML Models -- 5.2 Software and Hardware Performance -- 6 Conclusion -- References -- Enhancing the Cryptography Security of Message Communication by Modified Secure IDEA Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Generating an nnth-Order Quasi-Group -- 3.2 Generating the Master Key -- 3.3 Generating the Keys -- 3.4 Regenerating the Keys -- 3.5 Encryption and Decryption -- 4 Results -- 5 Discussion -- 6 Conclusion.
References -- Attackers Have Prior Beliefs: Comprehending Cognitive Aspects of Confirmation Bias on Adversarial Decisions -- 1 Introduction -- 2 Deception Game -- 3 Methods -- 3.1 Experiment Design -- 3.2 Stimuli -- 3.3 Participants -- 3.4 Procedure -- 3.5 Results -- 4 IBL Model -- 4.1 Calibration of Model Parameters -- 4.2 Model Results -- 5 Discussion and Conclusion -- References -- Privacy Preservation of Insurance Data Sharing Across Permissioned Blockchains -- 1 Introduction -- 1.1 Motivation -- 1.2 Paper Organization -- 2 Preliminaries -- 2.1 Hyperledger Fabric -- 2.2 Zero-Knowledge Proof -- 3 Current Issue in Isomorphic HLF Platform -- 3.1 Workflow of Insurance Claim -- 3.2 Fake Claim Scenario -- 4 System Model -- 4.1 User Registration -- 4.2 Insurance Claim -- 5 Experimental Results and Analysis -- 5.1 Implementation -- 5.2 Security Analysis -- 6 Conclusion and Future Scope -- References -- Survey on Cyber-Security for Healthcare System -- 1 Introduction -- 2 Background (Common Terms and Concept) -- 2.1 Implantable Medical Devices (IMD) -- 2.2 Active Implantable Device -- 2.3 Body Area Network (BAN) -- 3 Literature Survey -- 3.1 Methods -- 3.2 Analysis of Existing Work and Framing of the Problem -- 4 Solution Space -- 5 Conclusion -- References -- Image, Video and Signal Processing Track -- Enhancing Driver Safety and Experience: Real-Time Facial Expression Detection in Smart Vehicles with Vision Systems -- 1 Introduction -- 2 Literature Survey -- 2.1 Eye Aspect Ratio (EAR) -- 2.2 Physical Approach -- 2.3 Physiological Approach -- 2.4 Steering Wheel Data -- 2.5 Support Vector Machines (SVM) -- 2.6 Artificial Neural Networks (ANN) -- 3 Proposed System -- 3.1 The Dataset -- 3.2 System Architecture -- 3.3 Face Detection -- 3.4 Convolutional Neural Networks Classification Model -- 3.5 Predicting the Photos Generated by the Camera -- 4 Results.
5 Conclusion.
Titolo autorizzato: Proceedings of 4th International Conference on Frontiers in Computing and Systems  Visualizza cluster
ISBN: 9789819726141
9789819726134
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910872192703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Series