Intro; Preface; Contents; About the Editors; Security Systems; Enhancing Security in ROS; 1 Introduction; 2 Security Enhancements; 3 Technical Overview; 3.1 Robot Operating System; 3.2 SROS: Secure ROS; 4 Access Control Policy Generation; 4.1 Security Logging; 4.2 Policy Profile Syntax; 5 X.509 Certificate: Distribution Architecture; 5.1 User-Pull Architecture; 5.2 Server-Pull Architecture; 6 Related Work; 7 Conclusion; References; Byte Label Malware Classification Using Image Entropy; 1 Introduction; 2 Background; 2.1 Malware Analysis Techniques; 2.2 Texture Analysis of an Executable 2.3 Image Entropy in Malware Analysis3 Related Work; 4 Malware Classification Using Image Entropy; 4.1 Byte-to-Image Conversion; 4.2 Entropy Filter; 4.3 GIST Feature; 5 Experiments; 5.1 Dataset; 5.2 Experimental Result; 6 Conclusion; References; Big Data Security and Privacy: New Proposed Model of Big Data with Secured MR Layer; 1 Introduction; 1.1 Data Security and Privacy; 1.2 The Need for Privacy and Security in Big Data; 1.3 The Need for Light Weight Encryption; 1.4 Proposed Secure MapReduce (SMR) Model; 2 Related Work; 3 Proposed Work; 3.1 Overview; 3.2 Concept of Randomization 3.3 Perturbing the Data3.4 Hash Mapping; 3.5 Encryption; 3.6 Decryption; 3.7 Description of SMR Encryption Algorithm; 3.8 Application of Query on the Encrypted Data; 3.9 Description of SMR Decryption Algorithm; 4 Dataset Description; 4.1 Accessing the Twitter API; 4.2 Understanding Twitter Data; 4.3 Collecting Data; 5 Implementation and Results; 5.1 Encryption Side Implementation; 5.2 Decryption Side Implementation; 5.3 Results; 6 Conclusion and Future Work; References; IoT and Networks; Ambient Monitoring in Smart Home for Independent Living; 1 Introduction; 2 Literature Review 3 Proposed Framework of an Ambient Monitoring System3.1 SH Data Acquisition; 3.2 Monitoring System; 3.3 Tracking System; 4 Results and Discussion; 5 Conclusions; References; The Conceptual Approach of System for Automatic Vehicle Accident Detection and Searching for Life Signs of Casualties; 1 Introduction; 2 eCall System; 3 Authors' Approach; 4 Accident Detection; 5 Human Presence Detection; 6 Vital Signs; 6.1 Respiratory Rate; 6.2 Heart Rate; 7 Conclusions and Future Works; References; Disaster Management System Using Vehicular Ad Hoc Networks; 1 Introduction; 2 Related Works 3 Models and Design Goals3.1 System Model; 3.2 Design Requirements; 4 Proposed Solution: Disaster Management System; 5 Performance Analysis; 5.1 Probabilistic Analysis; 5.2 Simulation; 6 Conclusions; References; Pattern Recognition; A Computer-Aided Hybrid Framework for Early Diagnosis of Breast Cancer; 1 Introduction; 2 Proposed System; 2.1 Preprocessing; 2.2 Suspicious Regions Segmentation; 2.3 Feature Extraction; 2.4 Classifier Design; 3 Experimental Results and Discussion; 3.1 Database Collection; 3.2 Performance Assessment; 3.3 Classification; 4 Conclusion; References
0
SUMMARY OR ABSTRACT
Text of Note
The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9-11, 2018. The symposium was organized by the University of Calcutta's Department of Computer Science & Engineering and A. K. Choudhury School of Information Technology, and the International partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. Reflect the symposium's sessions, the book discusses topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.