Advanced smart computing technologies in cybersecurity and forensics
First Statement of Responsibility
/ edited by Keshav Kaushik ... [et al.].
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Boca Raton
Name of Publisher, Distributor, etc.
: CRC Press
Date of Publication, Distribution, etc.
, 2022.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource.
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index.
CONTENTS NOTE
Text of Note
Detection of cross site scripting and phishing website vulnerabilities using machine learning / Sunil Sikka, Charu Jain, Aarti Chugh -- A review : security and privacy defensive techniques for cyber security using deep neural networks (DNNs) / Prachi Chauhan, Hardwari Lal Mandoria, Alok Negi -- DNA-based cryptosystem for connected objects and IoT security / Belhorma Brahim, Bouhedda Mounir, Bengherbia Billel, Benzineb Omar -- A role of digital evidence : mobile forensics data / G Maria Jones, S Godfrey Winster, L Ancy Geoferla -- Analysis of kernel vulnerabilities using machine learning / Supriya Raheja, Rakesh Garg, Bhavya Gururani -- Cyber threat exploitation and growth during Covid-19 times / Romil Rawat, Anand Singh Rajawat, Vinod Mahor, Bhagwati Garg -- An overview of the cybersecurity in smart cities in the modern digital age / Reinaldo Padilha, Ana Carolina Borges Monteiro -- The fundamentals and potential for cyber security of machine learning in the modern world / Reinaldo Padilha, Ana Carolina Borges Monteiro -- Qualitative and quantitative evaluation of encryption algorithms / Supriya Raheja, Rakesh Garg, Durgesh Pandey -- Analysis and investigation of advanced malware forensics / Apirajitha P. S., Punitha S, Thompson Stephan -- Network intrusion detection system using na�ive Bayes classification technique for anomaly detection / Sam Goundar, Manveer Singh, Rahul Chand, Akashdeep Bhardwaj -- Data security analysis in mobile cloud computing for cyber security / Sam Goundar, Akashdeep Bhardwaj -- A critical review of legal and technical challenges during preliminary investigations of suspects of cyber crimes / Joshua Nehinbe -- Fault analysis techniques in lightweight ciphers for IoT devices / Priyanka Joshi, Bodhisatwa Mazumdar.
0
SUMMARY OR ABSTRACT
Text of Note
"This book addresses the topics related to artificial intelligence, internet of things, blockchain technology, and machine learning and brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics"--
TYPE OF ELECTRONIC RESOURCE NOTE
Text of Note
pdf file.
TOPICAL NAME USED AS SUBJECT
Entry Element
Computer security.
Entry Element
Computer crimes
Topical Subdivision
Investigation.
DEWEY DECIMAL CLASSIFICATION
Edition
23/eng/20211007
PERSONAL NAME - SECONDARY RESPONSIBILITY
Entry Element
Kaushik, Keshav,
Additions to Names Other than Dates
(Professor of computer science),
Relator Code
Editor
ORIGINATING SOURCE
Country
Iran
Agency
University of Tehran. Library of College of Science