top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Communication, Cloud, and Big Data : Proceedings of 2nd National Conference on CCB 2016 / / edited by Hiren Kumar Deva Sarma, Samarjeet Borah, Nitul Dutta
Advances in Communication, Cloud, and Big Data : Proceedings of 2nd National Conference on CCB 2016 / / edited by Hiren Kumar Deva Sarma, Samarjeet Borah, Nitul Dutta
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 173 p. 47 illus.)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Electrical engineering
Big data
Input-output equipment (Computers)
Communications Engineering, Networks
Big Data
Input/Output and Data Communications
ISBN 981-10-8911-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Survey on Energy Efficient Routing Protocols in Wireless Sensor Networks using Game Theory -- Chapter 2. Design and Analysis of Optimum APSK Modulation Technique -- Chapter 3. Big Data Analytics in the Higher Education: Need of the future. Chapter 4. Land Capability Classification for Agriculture: GIS and Remote Sensing Approach: A Survey -- Chapter 5. Review on Vehicular Radar for Road Safety -- Chapter 6. Landmark Based Robot Navigation: A Paradigm Shift from Onboard Processing to Cloud -- Chapter 7. From Cognitive Psychology to Image Segmentation: A Change of Perspective -- Chapter 8. An Exploration in Perception Based Digital Media Processing: A Psychological Perspective -- Chapter 9. Converting and developing live website into a web content management system -- Chapter 10. A Review on Existing QoS Routing Protocols Based on Link Efficiency and Link Stability -- Chapter 11. A Diamond Shaped Fractal Bow-Tie Antenna for THz Applications -- Chapter 12. A Study on Few Approaches to Counter Security Breaches in MANETs -- Chapter 13. A Survey: EMG Signal Based Controller as Human Computer Interaction -- Chapter 14 [CCB 1622-] IEEE 802.15.4 as the MAC protocol for Internet of Things (IoT) Applications for achieving QoS and Energy Efficiency -- Chapter 15. HMM Based Speaker Gender Recognition for Bodo Language -- Chapter 16. Accurate Drainage Network Extraction From Satellite Imagery –a Survey -- Chapter 17. Survey on Transmission Control Protocol Performance over different Mobile Ad-Hoc Routing Protocols -- Chapter 18 -- Survey on detection and mitigation of Distributed Denial of Service attack in named data networking.
Record Nr. UNINA-9910337626703321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary issues in communication, cloud and big data analytics : proceedings of CCB 2020 / / Hiren Kumar Deva Sarma [and three others], editors
Contemporary issues in communication, cloud and big data analytics : proceedings of CCB 2020 / / Hiren Kumar Deva Sarma [and three others], editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (466 pages)
Disciplina 005.8
Collana Lecture notes in networks and systems
Soggetto topico Computer security
ISBN 981-16-4244-3
981-16-4243-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743392603321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security
Cyber Security
Autore Dutta Nitul
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (183 pages)
Altri autori (Persone) JadavNilesh
TanwarSudeep
SarmaHiren Kumar Deva
PricopEmil
Collana Studies in Computational Intelligence Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-6597-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Authors -- 1 Introduction to Cybersecurity -- 1 Introduction to Cybersecurity -- 1.1 Introduction -- 1.2 The Necessity of Cybersecurity -- 1.3 Cybersecurity and Ethics -- 2 Domains of Cybersecurity -- 3 Threats and Actors -- 3.1 Threats in Cyberspace -- 3.2 Types of Threats -- 3.3 Threat Actors and Types of Threat Actors -- 4 Recent Attacks -- 5 Awareness of Cybersecurity in Educational System -- 6 The Outline of the Book -- References -- 2 Being Hidden and Anonymous -- 1 Introduction -- 1.1 The Need for Anonymity -- 2 The Onion Router -- 3 Invisible Internet Project (IIP or I2P) -- 3.1 Working of I2P -- 4 Freenet -- 5 Java Anon Proxy (JAP) -- 6 Summary -- References -- 3 TOR-The Onion Router -- 1 Introduction -- 2 TOR-The Onion Router -- 2.1 Onion Routing -- 3 TOR Browser Installation -- 4 TOR Entities -- 5 TOR Status -- 6 TOR for Mobile-Orbot -- 7 Loopholes in TOR -- 8 What not to Use in TOR -- References -- 4 DarkNet and Hidden Services -- 1 Introduction -- 2 TOR and Its Hidden Service -- 3 Essential Concepts of TOR Hidden Services -- 4 Installation of Hidden Service in Linux -- 5 Countermeasures to Secure Your Own Hidden Service -- References -- 5 Introduction to Digital Forensics -- 1 Introduction to Forensics -- 2 Cyberforensic Process -- 3 Different Artifacts and Forensic Tools -- 3.1 Autopsy -- 3.2 DumpIt -- 3.3 Belkasoft Live RAM Capturer -- 4 Artifacts Gathering -- 4.1 Browser Artifacts -- 4.2 Registry Artifacts -- 4.3 Bulk Extractor -- 5 Network Forensics -- 5.1 ARP Cache Poisoning -- 5.2 Port Mirroring -- 5.3 Flooding -- 5.4 Dynamic Host Control Protocol (DHCP) Redirection -- 5.5 Detection of TOR Traffic in the Captured Traffic -- 6 Conclusion -- References -- 6 Intrusion Detection Systems Fundamentals -- 1 Introduction to Intrusion Detection System -- 2 Techniques to Combat Cyberthreats.
2.1 Firewall -- 2.2 Authentication -- 2.3 Authorization -- 2.4 Encryption -- 2.5 Intrusion Detection System -- 3 Network-Based Intrusion Detection System (NIDS) -- 4 Host-Based Intrusion Detection System (HIDS) -- 5 Distributed Intrusion Detection System (DIDS) -- 5.1 Signature-Based Analysis -- 5.2 Anomaly-Based Analysis -- 6 Snort-Network-Based Intrusion Detection System -- 6.1 Additional Snort Add-Ons -- 6.2 Installation of Snort in Linux -- 6.3 Snort Rules -- 6.4 Rule Header -- 6.5 Rules Options -- 7 Open-Source Host-Based Intrusion Detection System (OSSEC) -- 7.1 Installation of OSSEC in Linux -- 8 Summary -- References -- 7 Introduction to Malware Analysis -- 1 Introduction of Malware -- 2 Types of Malware -- 3 Malware Symptoms -- 4 Need of Malware Analysis and Spreading Mechanism -- 4.1 Need for Malware Analysis -- 4.2 Malware Spreading Mechanism -- 5 Malware Analysis Prerequisites -- 6 Malware Analysis Environment -- 7 Malware Detection System and Analysis -- 7.1 Malware Detection -- 7.2 Malware Analysis -- 8 Conclusion -- References -- 8 Design of a Virtual Cybersecurity Lab -- 1 Introduction of Cybersecurity -- 2 Tools for Cybersecurity -- 3 Virtualization for Cybersecurity -- 4 Installation and Configuration of VMWare Workstation -- 5 Network Modes in Virtual Machines -- 6 Cybersecurity and Various Attacks -- 7 Defense Strategies Against Various Attacks -- 8 Case Study on Website Attacks -- 9 Conclusion -- References -- 9 Importance of Cyberlaw -- 1 Introduction -- 2 Why Cyberlaw is Necessary -- 3 Global Landscape of Cyberlaw -- 4 Cybercrimes -- 4.1 Categories of Cybercrime -- 4.2 Types of Cybercrime -- 5 Conclusion -- References.
Altri titoli varianti Cyber Security
Record Nr. UNINA-9910508473403321
Dutta Nitul  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trends in Communication, Cloud, and Big Data : Proceedings of 3rd National Conference on CCB, 2018 / / edited by Hiren Kumar Deva Sarma, Bhaskar Bhuyan, Samarjeet Borah, Nitul Dutta
Trends in Communication, Cloud, and Big Data : Proceedings of 3rd National Conference on CCB, 2018 / / edited by Hiren Kumar Deva Sarma, Bhaskar Bhuyan, Samarjeet Borah, Nitul Dutta
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XIII, 168 p.)
Disciplina 004
Collana Lecture Notes in Networks and Systems
Soggetto topico Electrical engineering
Big data
Input-output equipment (Computers)
Communications Engineering, Networks
Big Data
Input/Output and Data Communications
ISBN 981-15-1624-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910373896703321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui