001442380 000__ 05347cam\a2200637\i\4500 001442380 001__ 1442380 001442380 003__ OCoLC 001442380 005__ 20230310003416.0 001442380 006__ m\\\\\o\\d\\\\\\\\ 001442380 007__ cr\cn\nnnunnun 001442380 008__ 211006s2022\\\\si\a\\\\o\\\\\101\0\eng\d 001442380 019__ $$a1273474152$$a1273668621$$a1287774914 001442380 020__ $$a9789811639616$$q(electronic bk.) 001442380 020__ $$a9811639612$$q(electronic bk.) 001442380 020__ $$z9789811639609$$q(print) 001442380 020__ $$z9811639604 001442380 0247_ $$a10.1007/978-981-16-3961-6$$2doi 001442380 035__ $$aSP(OCoLC)1273490329 001442380 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dOCLCF$$dDCT$$dOCLCO$$dOCLCA$$dOCLCQ$$dCOM$$dOCLCO$$dN$T$$dOCLCQ 001442380 049__ $$aISEA 001442380 050_4 $$aQA76.9.A25 001442380 08204 $$a005.8$$223 001442380 1112_ $$aInternational Conference on Applications and Techniques in Cyber Security and Digital Forensics$$d(2021 :$$cHaryana, India) 001442380 24510 $$aCyber security and digital forensics :$$bproceedings of ICCSDF 2021 /$$cKavita Khanna, Vania Vieira Estrela, Joel José Puga Coelho Rodrigues, editors. 001442380 2463_ $$aICCSDF 2021 001442380 264_1 $$aSingapore :$$bSpringer,$$c[2022] 001442380 300__ $$a1 online resource (xiv, 623 pages) :$$billustrations (some color) 001442380 336__ $$atext$$btxt$$2rdacontent 001442380 337__ $$acomputer$$bc$$2rdamedia 001442380 338__ $$aonline resource$$bcr$$2rdacarrier 001442380 347__ $$atext file 001442380 347__ $$bPDF 001442380 4901_ $$aLecture notes on data engineering and communications technologies,$$x2367-4520 ;$$vvolume 73 001442380 500__ $$aIncludes author index. 001442380 5050_ $$aChapter 1. A systematic approach for analyzing log files based on string matching regular expressions -- Chapter 2. An efficient detection and prevention approach of unknown malicious attack: A novel honeypot approach -- Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare System in Uttarakhand -- Chapter 4. Android Malware Detection using Extreme Learning Machine optimized with Swarm Intelligence -- Chapter 5. Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform -- Chapter 6. Authentication of Digital Media using Reversible Watermarking -- Chapter 7. Automatic Test Case Generation and Fault Tolerant Framework Based on N Version and Recovery Block Mechanism -- Chapter 8. Chatbot to Map Medical Prognosis and Symptoms using Machine Learning -- Chapter 9. Cloud Security: The Future of Data Storage -- Chapter 10. Curbing Criminal Acts on Mobile Phone Network -- Chapter 11. Designing of Fuzzy logic-based Intrusion detection system (FIDS) for detection of Blckhole attack in AODV for MANETs -- Chapter 12. Detection of Phishing Websites Using Classification Algorithms -- Chapter 13. IoT Based Smart Security System for Agriculture Fields -- Chapter 14. Efficient Clustering of Transactional data for Privacy-Preserving Data Publishing -- Chapter 15. Passive Video Forgery Detection Techniques to Detect Copy Move Tampering through Feature Comparison and RANSAC. 001442380 506__ $$aAccess limited to authorized users. 001442380 520__ $$aThis book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3-4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime. 001442380 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 6, 2021). 001442380 650_0 $$aComputer security$$vCongresses. 001442380 650_0 $$aDigital forensic science$$vCongresses. 001442380 650_6 $$aSécurité informatique$$vCongrès. 001442380 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001442380 655_7 $$aConference papers and proceedings.$$2lcgft 001442380 655_7 $$aActes de congrès.$$2rvmgf 001442380 655_0 $$aElectronic books. 001442380 7001_ $$aKhanna, Kavita,$$eeditor. 001442380 7001_ $$aEstrela, Vania Vieira,$$eeditor$$1https://orcid.org/0000-0002-4465-7691 001442380 7001_ $$aRodrigues, Joel,$$d1972-$$eeditor. 001442380 77608 $$iPrint version:$$aInternational Conference on Applications and Techniques in Cyber Security and Digital Forensics (2021 : Haryana, India).$$tCyber security and digital forensics.$$dSingapore : Springer, [2022]$$z9811639604$$z9789811639609$$w(OCoLC)1255174189 001442380 830_0 $$aLecture notes on data engineering and communications technologies ;$$vv. 73. 001442380 852__ $$bebk 001442380 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-16-3961-6$$zOnline Access$$91397441.1 001442380 909CO $$ooai:library.usi.edu:1442380$$pGLOBAL_SET 001442380 980__ $$aBIB 001442380 980__ $$aEBOOK 001442380 982__ $$aEbook 001442380 983__ $$aOnline 001442380 994__ $$a92$$bISE