000917297 000__ 06583cam\a2200589Ii\4500 000917297 001__ 917297 000917297 005__ 20230306150657.0 000917297 006__ m\\\\\o\\d\\\\\\\\ 000917297 007__ cr\cn\nnnunnun 000917297 008__ 191120s2019\\\\si\a\\\\o\\\\\101\0\eng\d 000917297 020__ $$a9789811508714$$q(electronic book) 000917297 020__ $$a9811508712$$q(electronic book) 000917297 020__ $$z9789811508707 000917297 0247_ $$a10.1007/978-981-15-0871-4$$2doi 000917297 035__ $$aSP(OCoLC)on1128098017 000917297 035__ $$aSP(OCoLC)1128098017 000917297 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dDKU$$dUKMGB$$dOCLCF 000917297 049__ $$aISEA 000917297 050_4 $$aQA76.9.A25 000917297 08204 $$a005.8$$223 000917297 1112_ $$aATIS (Conference)$$n(10th :$$d2019 :$$cThanjāvūr, India) 000917297 24510 $$aApplications and techniques in information security :$$b10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings /$$cV. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li (eds.). 000917297 2463_ $$aATIS 2019 000917297 264_1 $$aSingapore :$$bSpringer,$$c2019. 000917297 300__ $$a1 online resource (xi, 313 pages) :$$billustrations. 000917297 336__ $$atext$$btxt$$2rdacontent 000917297 337__ $$acomputer$$bc$$2rdamedia 000917297 338__ $$aonline resource$$bcr$$2rdacarrier 000917297 4901_ $$aCommunications in computer and information science,$$x1865-0929 ;$$v1116 000917297 500__ $$aInternational conference proceedings. 000917297 500__ $$aIncludes author index. 000917297 50580 $$g[I].$$tInformation security:$$tA memory-efficient multiple string matching algorithm based on charset transformation /$$rYuhai Lu, Yanbing Liu, Gongxin Sun, and Jianlong Tan --$$tAn image mathcrypt : a flawless security via flawed image /$$rR. Anushiadevi, Veeramuthu Venkatesh, and Rengarajan Amirtharajan --$$tSecure ATM device design by control command verification /$$rHisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, and Tsutomu Matsumoto --$$tConstruction of two dimensional cubic-tent-sine map for secure image transmission /$$rSujarani Rajendran and Manivannan Doraipandian --$$tConfused memory read attracts synthetic diffusion on the fly : a lightweight image encryption for IoT platform /$$rVinoth Raj, Siva Janakiraman, Sundararaman Rajagopalan, and Amirtharajan Rengarajan. 000917297 50580 $$g[II].$$tNetwork security:$$tInsider attacks on Zigbee based IoT networks by exploiting AT commands /$$rWaqas Ahmad Piracha, Morshed Chowdhury, Biplob Ray, Sutharshan Rajasegarar, and Robin Doss --$$tA survey on various integrity verification schemes on the data outsourced to cloud storage /$$rS. Milton Ganesh and S. P. Manikandan --$$tPrognostic views on software defined networks based security for Internet of Things /$$rAntony Taurshia, Jaspher W. Kathrine, and D. Shibin --$$tIntegrity checking of cloud data with an auditing mechanism using ECC and Merkle hash tree /$$rT. Suriya Praba and V. Meena --$$tAnomaly detection in critical infrastructure using probabilistic neural network /$$rM. R. Gauthama Raman, Nivethitha Somu, and Aditya P. Mathur --$$tChaotic map based key generation and realistic power allocation technique for secure MU-MIMO wireless system /$$rC. Manikandan, S. Rakesh Kumar, Kopparthi Nikhith, M. Sai Gayathri, and P. Neelamegam. 000917297 50580 $$g[III].$$tIntrusion detection system:$$tA survey of machine learning techniques used to combat against the advanced persistent threat /$$rE. Rajalakshmi, N. Asik Ibrahim, and V. Subramaniyaswamy --$$tSubtree hypergraph-based attack detection model for signature matching over SCADA HMI /$$rSujeet S. Jagtap and V. S. Shankar Sriram --$$tComputational CBGSA : SVM model for network based intrusion detection system /$$rTina Manghnani and T. Thirumaran --$$tAttention-based LSTM for insider threat detection /$$rFangfang Yuan, Yanmin Shang, Yanbing Liu, Yanan Cao, and Jianlong Tan --$$tCog-SDN : mitigation mechanism for distributed denial of service attacks in software defined networks /$$rP. Mohana Priya and K. R. Manjula. 000917297 50580 $$g[IV].$$tAuthentication and key management system:$$tPassword strength estimators trained on the leaked password lists /$$rCameron R. Schafer and Lei Pan --$$tCellular automata based key stream generator : a reconfigurable hardware approach /$$rSundararaman Rajagopalan, Nikhil Krishnaa Sriram, V. Manikandan, Sivaraman Rethinam, Sridevi Arumugham, Siva Janakiraman, and Amirtharajan Rengarajan --$$tHardware Trojan on SIMON architecture for key retrieval /$$rSivappriya Manivannan and K. K. Soundra Pandian --$$tPrivacy-preserving authentication scheme using reduced-advanced encryption standard for vehicular ad hoc network /$$rS. Sharon, T. Suriya Praba, R. Anushiadevi, and Veeramuthu Venkatesh --$$tOn the security of the double-block-length hash function NCASH /$$rTapadyoti Banerjee and Dipanwita Roy Chowdhury. 000917297 50580 $$g[V].$$tSecurity centric applications:$$tTele-transmission of secured prefrontal cortex information records for remote health care /$$rMonish Ram K, Ananya Sairaj, Ramya Lakshmi Srinivasan, Raajan N R, and Girish Ganesan R --$$tEncryption by heart (EbH) for secured data transmission and CNN based EKG signal classification of arrhythmia with normal data /$$rTarun Kumar D, Ramya Lakshmi Srinivasan, and Raajan N R --$$tRipping the fabric : attacks and mitigations on hyperledger fabric /$$rAhaan Dabholkar and Vishal Saraswat. 000917297 506__ $$aAccess limited to authorized users. 000917297 520__ $$aThis book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications. --$$cProvided by publisher. 000917297 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 20, 2019). 000917297 650_0 $$aComputer security$$vCongresses. 000917297 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000917297 7001_ $$aSriram, V. S. Shankar,$$eeditor. 000917297 7001_ $$aSubramaniyaswamy, V.$$eeditor. 000917297 7001_ $$aSasikaladevi, N.$$eeditor. 000917297 7001_ $$aZhang, Leo,$$eeditor. 000917297 7001_ $$aBatten, Lynn,$$eeditor. 000917297 7001_ $$aLi, Gang$$c(Computer scientist),$$eeditor. 000917297 830_0 $$aCommunications in computer and information science ;$$v1116. 000917297 852__ $$bebk 000917297 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-15-0871-4$$zOnline Access$$91397441.1 000917297 909CO $$ooai:library.usi.edu:917297$$pGLOBAL_SET 000917297 980__ $$aEBOOK 000917297 980__ $$aBIB 000917297 982__ $$aEbook 000917297 983__ $$aOnline 000917297 994__ $$a92$$bISE