Advances in Communication, Cloud, and Big Data : Proceedings of 2nd National Conference on CCB 2016 / / edited by Hiren Kumar Deva Sarma, Samarjeet Borah, Nitul Dutta |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 173 p. 47 illus.) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Electrical engineering
Big data Input-output equipment (Computers) Communications Engineering, Networks Big Data Input/Output and Data Communications |
ISBN | 981-10-8911-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Survey on Energy Efficient Routing Protocols in Wireless Sensor Networks using Game Theory -- Chapter 2. Design and Analysis of Optimum APSK Modulation Technique -- Chapter 3. Big Data Analytics in the Higher Education: Need of the future. Chapter 4. Land Capability Classification for Agriculture: GIS and Remote Sensing Approach: A Survey -- Chapter 5. Review on Vehicular Radar for Road Safety -- Chapter 6. Landmark Based Robot Navigation: A Paradigm Shift from Onboard Processing to Cloud -- Chapter 7. From Cognitive Psychology to Image Segmentation: A Change of Perspective -- Chapter 8. An Exploration in Perception Based Digital Media Processing: A Psychological Perspective -- Chapter 9. Converting and developing live website into a web content management system -- Chapter 10. A Review on Existing QoS Routing Protocols Based on Link Efficiency and Link Stability -- Chapter 11. A Diamond Shaped Fractal Bow-Tie Antenna for THz Applications -- Chapter 12. A Study on Few Approaches to Counter Security Breaches in MANETs -- Chapter 13. A Survey: EMG Signal Based Controller as Human Computer Interaction -- Chapter 14 [CCB 1622-] IEEE 802.15.4 as the MAC protocol for Internet of Things (IoT) Applications for achieving QoS and Energy Efficiency -- Chapter 15. HMM Based Speaker Gender Recognition for Bodo Language -- Chapter 16. Accurate Drainage Network Extraction From Satellite Imagery –a Survey -- Chapter 17. Survey on Transmission Control Protocol Performance over different Mobile Ad-Hoc Routing Protocols -- Chapter 18 -- Survey on detection and mitigation of Distributed Denial of Service attack in named data networking. |
Record Nr. | UNINA-9910337626703321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Contemporary issues in communication, cloud and big data analytics : proceedings of CCB 2020 / / Hiren Kumar Deva Sarma [and three others], editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (466 pages) |
Disciplina | 005.8 |
Collana | Lecture notes in networks and systems |
Soggetto topico | Computer security |
ISBN |
981-16-4244-3
981-16-4243-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910743392603321 |
Singapore : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security |
Autore | Dutta Nitul |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (183 pages) |
Altri autori (Persone) |
JadavNilesh
TanwarSudeep SarmaHiren Kumar Deva PricopEmil |
Collana | Studies in Computational Intelligence Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-6597-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Authors -- 1 Introduction to Cybersecurity -- 1 Introduction to Cybersecurity -- 1.1 Introduction -- 1.2 The Necessity of Cybersecurity -- 1.3 Cybersecurity and Ethics -- 2 Domains of Cybersecurity -- 3 Threats and Actors -- 3.1 Threats in Cyberspace -- 3.2 Types of Threats -- 3.3 Threat Actors and Types of Threat Actors -- 4 Recent Attacks -- 5 Awareness of Cybersecurity in Educational System -- 6 The Outline of the Book -- References -- 2 Being Hidden and Anonymous -- 1 Introduction -- 1.1 The Need for Anonymity -- 2 The Onion Router -- 3 Invisible Internet Project (IIP or I2P) -- 3.1 Working of I2P -- 4 Freenet -- 5 Java Anon Proxy (JAP) -- 6 Summary -- References -- 3 TOR-The Onion Router -- 1 Introduction -- 2 TOR-The Onion Router -- 2.1 Onion Routing -- 3 TOR Browser Installation -- 4 TOR Entities -- 5 TOR Status -- 6 TOR for Mobile-Orbot -- 7 Loopholes in TOR -- 8 What not to Use in TOR -- References -- 4 DarkNet and Hidden Services -- 1 Introduction -- 2 TOR and Its Hidden Service -- 3 Essential Concepts of TOR Hidden Services -- 4 Installation of Hidden Service in Linux -- 5 Countermeasures to Secure Your Own Hidden Service -- References -- 5 Introduction to Digital Forensics -- 1 Introduction to Forensics -- 2 Cyberforensic Process -- 3 Different Artifacts and Forensic Tools -- 3.1 Autopsy -- 3.2 DumpIt -- 3.3 Belkasoft Live RAM Capturer -- 4 Artifacts Gathering -- 4.1 Browser Artifacts -- 4.2 Registry Artifacts -- 4.3 Bulk Extractor -- 5 Network Forensics -- 5.1 ARP Cache Poisoning -- 5.2 Port Mirroring -- 5.3 Flooding -- 5.4 Dynamic Host Control Protocol (DHCP) Redirection -- 5.5 Detection of TOR Traffic in the Captured Traffic -- 6 Conclusion -- References -- 6 Intrusion Detection Systems Fundamentals -- 1 Introduction to Intrusion Detection System -- 2 Techniques to Combat Cyberthreats.
2.1 Firewall -- 2.2 Authentication -- 2.3 Authorization -- 2.4 Encryption -- 2.5 Intrusion Detection System -- 3 Network-Based Intrusion Detection System (NIDS) -- 4 Host-Based Intrusion Detection System (HIDS) -- 5 Distributed Intrusion Detection System (DIDS) -- 5.1 Signature-Based Analysis -- 5.2 Anomaly-Based Analysis -- 6 Snort-Network-Based Intrusion Detection System -- 6.1 Additional Snort Add-Ons -- 6.2 Installation of Snort in Linux -- 6.3 Snort Rules -- 6.4 Rule Header -- 6.5 Rules Options -- 7 Open-Source Host-Based Intrusion Detection System (OSSEC) -- 7.1 Installation of OSSEC in Linux -- 8 Summary -- References -- 7 Introduction to Malware Analysis -- 1 Introduction of Malware -- 2 Types of Malware -- 3 Malware Symptoms -- 4 Need of Malware Analysis and Spreading Mechanism -- 4.1 Need for Malware Analysis -- 4.2 Malware Spreading Mechanism -- 5 Malware Analysis Prerequisites -- 6 Malware Analysis Environment -- 7 Malware Detection System and Analysis -- 7.1 Malware Detection -- 7.2 Malware Analysis -- 8 Conclusion -- References -- 8 Design of a Virtual Cybersecurity Lab -- 1 Introduction of Cybersecurity -- 2 Tools for Cybersecurity -- 3 Virtualization for Cybersecurity -- 4 Installation and Configuration of VMWare Workstation -- 5 Network Modes in Virtual Machines -- 6 Cybersecurity and Various Attacks -- 7 Defense Strategies Against Various Attacks -- 8 Case Study on Website Attacks -- 9 Conclusion -- References -- 9 Importance of Cyberlaw -- 1 Introduction -- 2 Why Cyberlaw is Necessary -- 3 Global Landscape of Cyberlaw -- 4 Cybercrimes -- 4.1 Categories of Cybercrime -- 4.2 Types of Cybercrime -- 5 Conclusion -- References. |
Altri titoli varianti | Cyber Security |
Record Nr. | UNINA-9910508473403321 |
Dutta Nitul | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trends in Communication, Cloud, and Big Data : Proceedings of 3rd National Conference on CCB, 2018 / / edited by Hiren Kumar Deva Sarma, Bhaskar Bhuyan, Samarjeet Borah, Nitul Dutta |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XIII, 168 p.) |
Disciplina | 004 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Electrical engineering
Big data Input-output equipment (Computers) Communications Engineering, Networks Big Data Input/Output and Data Communications |
ISBN | 981-15-1624-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910373896703321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|