Author |
Bhatia, Sanjiv K.
|
Series |
Advances in Intelligent Systems and Computing Ser. ; v.1158 |
|
Advances in Intelligent Systems and Computing Ser.
|
Alt Name |
Tiwari, Shailesh.
|
|
Ruidan, Su.
|
|
Trivedi, Munesh Chandra.
|
|
Mishra, K. K.
|
Description |
1 online resource (1013 p.). |
Note |
Description based upon print version of record. |
Contents |
Intro -- Preface -- About This Book -- Contents -- About the Editors -- Advanced Communications and Security -- A Novel Crypto-Ransomware Family Classification Based on Horizontal Feature Simplification -- 1 Introduction -- 2 Related Work -- 3 Objectives -- 4 Methodology -- 4.1 Data Collection -- 4.2 Android Application Package Conversion into Hexadecimal Codes -- 4.3 Hexadecimal Code to Dynamic Image Transfiguration -- 4.4 Horizontal Feature Simplification -- 4.5 Crypto-Ransomware Classification -- 5 Results and Discussion -- 6 Conclusion -- References |
|
Characteristic Analysis and Experimental Simulation of Diffuse Link Channel for Indoor Wireless Optical Communication -- 1 Introduction -- 2 Diffuse Link Channel -- 3 Channel Characteristic Analysis -- 4 Experimental Simulation and Discussion -- 4.1 Effect of Physical Parameters -- 4.2 Effect of Field of View (FOV) Angle and Half-Power (HP) Angle -- 5 Conclusion -- References -- A Comparative Analysis of Malware Anomaly Detection -- 1 Introduction -- 1.1 Anomaly Detection -- 1.2 Classification Algorithms -- 2 Related Work -- 3 Dataset and Tool Description |
|
3.1 Waikato to Environment for Knowledge Analysis (WEKA) -- 3.2 Cross-Validation -- 3.3 Performance Metrics Used -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Future Identity Card Using Lattice-Based Cryptography and Steganography -- 1 Introduction -- 2 Literature Review -- 2.1 Hybrid Information Security -- 2.2 Implementation of NTRU -- 3 Proposed System -- 3.1 System Architecture -- 3.2 Encoding Procedure -- 3.3 Decoding Procedure -- 4 Result and Analysis -- 5 Conclusion -- References |
|
Cryptanalysis on Attribute-Based Encryption from Ring-Learning with Error (R-LWE) -- 1 Introduction -- 2 Preliminaries -- 3 Cryptanalysis of ABER-LWE Scheme -- 3.1 Review of ABER-LWE Scheme -- 3.2 Collusion Attack on ABER-LWE Scheme -- 4 Conclusion -- References -- Enhanced Password-Based Authentication Mechanism in Cloud Computing with Extended Honey Encryption (XHE): A Case Study on Diabetes Dataset -- 1 Introduction -- 2 EXtended Honey Encryption (XHE) Algorithm in Securing Password and Diabetes Data in Cloud Computing -- 3 Implementation and Performance Analysis -- 4 Conclusion -- References |
|
An Enhanced Wireless Presentation System for Large-Scale Content Distribution -- 1 Introduction -- 2 Related Works -- 3 Experimental Setup -- 3.1 Setup of Network Connectivity and Server -- 3.2 Test Event and Metrics -- 4 Results and Analysis -- 5 Conclusion -- References -- On Confidentiality, Integrity, Authenticity, and Freshness (CIAF) in WSN -- 1 Introduction -- 2 Constraints in Wireless Sensor Network -- 2.1 Control Packet Overhead -- 2.2 Collision -- 2.3 Idle Listening -- 2.4 Overhearing -- 3 Concerned Security Issues -- 3.1 Data Authentication -- 3.2 Data Confidentiality |
ISBN |
9789811544095 |
|
9811544093 |
|
9811544085 |
|
9789811544088 |
OCLC # |
1204139430 |
Additional Format |
Print version: Bhatia, Sanjiv K. Advances in Computer, Communication and Computational Sciences : Proceedings of IC4S 2019 Singapore : Springer Singapore Pte. Limited,c2020 9789811544088 |
|