Linked e-resources
Details
Table of Contents
Chapter 1. A systematic approach for analyzing log files based on string matching regular expressions
Chapter 2. An efficient detection and prevention approach of unknown malicious attack: A novel honeypot approach
Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare System in Uttarakhand
Chapter 4. Android Malware Detection using Extreme Learning Machine optimized with Swarm Intelligence
Chapter 5. Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform
Chapter 6. Authentication of Digital Media using Reversible Watermarking
Chapter 7. Automatic Test Case Generation and Fault Tolerant Framework Based on N Version and Recovery Block Mechanism
Chapter 8. Chatbot to Map Medical Prognosis and Symptoms using Machine Learning
Chapter 9. Cloud Security: The Future of Data Storage
Chapter 10. Curbing Criminal Acts on Mobile Phone Network
Chapter 11. Designing of Fuzzy logic-based Intrusion detection system (FIDS) for detection of Blckhole attack in AODV for MANETs
Chapter 12. Detection of Phishing Websites Using Classification Algorithms
Chapter 13. IoT Based Smart Security System for Agriculture Fields
Chapter 14. Efficient Clustering of Transactional data for Privacy-Preserving Data Publishing
Chapter 15. Passive Video Forgery Detection Techniques to Detect Copy Move Tampering through Feature Comparison and RANSAC.
Chapter 2. An efficient detection and prevention approach of unknown malicious attack: A novel honeypot approach
Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare System in Uttarakhand
Chapter 4. Android Malware Detection using Extreme Learning Machine optimized with Swarm Intelligence
Chapter 5. Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform
Chapter 6. Authentication of Digital Media using Reversible Watermarking
Chapter 7. Automatic Test Case Generation and Fault Tolerant Framework Based on N Version and Recovery Block Mechanism
Chapter 8. Chatbot to Map Medical Prognosis and Symptoms using Machine Learning
Chapter 9. Cloud Security: The Future of Data Storage
Chapter 10. Curbing Criminal Acts on Mobile Phone Network
Chapter 11. Designing of Fuzzy logic-based Intrusion detection system (FIDS) for detection of Blckhole attack in AODV for MANETs
Chapter 12. Detection of Phishing Websites Using Classification Algorithms
Chapter 13. IoT Based Smart Security System for Agriculture Fields
Chapter 14. Efficient Clustering of Transactional data for Privacy-Preserving Data Publishing
Chapter 15. Passive Video Forgery Detection Techniques to Detect Copy Move Tampering through Feature Comparison and RANSAC.