Cyber security and digital forensics : select proceedings of the international conference, ReDCySec 2023 / Nihar Ranjan Roy, Sudeep Tanwar, Usha Batra, editors.

The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and ana...

Full description

Saved in:
Bibliographic Details
Corporate Author: International Conference on Recent Developments in Cyber Security Greater Noida, India
Other Authors: Roy, Nihar Ranjan (Editor), Tanwar, Sudeep (Editor), Batra, Usha (Editor)
Format: Ebook
Language:English
Published: Singapore : Springer, 2024.
Series:Lecture notes in networks and systems ; v. 896
Subjects:
Online Access:Springer eBooks
Table of Contents:
  • Intro
  • Preface
  • Contents
  • Editors and Contributors
  • A Low-Distortion Reversible Steganography Method that Conceals Data in Images with Minimal Distortion
  • 1 Introduction
  • 2 Literature Review
  • 3 Methodology
  • 4 Experimental Results
  • 5 Conclusion
  • References
  • Credit Card Fraud Detection Using ML Techniques
  • 1 Introduction
  • 2 Related Works
  • 2.1 Classification of the Techniques and Application
  • 2.2 Literature Survey
  • 3 Experimental Design, Results, and Discussions
  • 3.1 Dataset Description
  • 4 Conclusion
  • References
  • An Effective Model for Binary and Multi-classification Based on RFE and XGBoost Methods in Intrusion Detection System
  • 1 Introduction
  • 2 Literature Review
  • 3 Research Methodology
  • 3.1 Problem Statement
  • 3.2 Proposed Methodology
  • 4 Results Illustrations
  • 4.1 Dataset
  • 4.2 Performance Metrics
  • 5 Conclusion
  • References
  • ENCRYPTO: A Reliable and Efficient Mobile App for Password Management
  • 1 Introduction
  • 2 Literature Review
  • 3 Motivation and Problem Statement
  • 4 Overview of Proposed ENCRYPTO Application
  • 5 Results and Discussion
  • 6 Security Analysis of ENCRYPTO.
  • 7 Complexity Analysis and Comparison
  • 8 Conclusion
  • References
  • A Survey on Path Key Establishment
  • 1 Introduction
  • 2 Work Done
  • 3 Comparative Analysis of Different Schemes
  • 4 Research Directions/Challenges
  • 5 Conclusion
  • References
  • Detection of Phishing Link Using Different Machine Learning Techniques
  • 1 Introduction
  • 2 Literature Survey
  • 3 Different Phishing Link Detection Approaches
  • 4 Anatomy of Phishing URL
  • 5 URL-Based Approach
  • 6 URL-Based Features
  • 7 Common Algorithms Used for URL-Based Detection
  • 8 Experimental Results and Findings
  • 9 Conclusion and Future Work
  • References
  • Secure Horizons: Advanced Protection Mechanisms for Holographic Data Storage Systems
  • 1 Introduction
  • 2 Literature Review
  • 3 Holographic Data Storage Systems: Principles and Characteristics
  • 3.1 Principles of Holography
  • 3.2 HDSS Architecture
  • 3.3 Advantages and Limitations of HDSS
  • 3.4 Comparison with Traditional Storage Systems
  • 4 Security Threats and Vulnerabilities in HDSS
  • 4.1 Overview of Potential Attack Vectors
  • 4.2 Unauthorized Data Access and Tampering
  • 4.3 Data Integrity and Confidentiality Concerns
  • 4.4 Vulnerabilities in HDSS Components and Processes
  • 5 A Comprehensive Security Framework for HDSS
  • 5.1 Advanced Encryption Techniques
  • 5.2 Robust Access Control Mechanisms
  • 5.3 Cutting-Edge Intrusion Detection Systems
  • 5.4 Integration of Security Measures Within HDSS Architecture
  • 6 Challenges and Limitations in Implementing HDSS Security
  • 6.1 Performance and Scalability Trade-Offs
  • 6.2 Compatibility with Existing Systems and Standards
  • 6.3 Legal and Regulatory Considerations
  • 6.4 Cost and Resource Constraints
  • 7 Conclusion
  • References.
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.