صورة الغلاف المحلية
صورة الغلاف المحلية
عرض عادي

Security and privacy : second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January 9-11, 2019, revised selected papers / Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki

بواسطة:المساهم (المساهمين):نوع المادة : نصنصاللغة: الإنجليزية السلاسل:Communications in computer and information science ; 939الناشر:Singapore : Springer, 2019وصف:xii, 301 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9789811375606
  • 9789811375613
  • 9811375615
عنوان آخر:
  • ISEA-ISAP 2018
الموضوع:تنسيقات مادية إضافية:Printed edition:: بدون عنوان; Printed edition:: بدون عنوانتصنيف مكتبة الكونجرس:
  • QA76.9.A25 S438 2019
المحتويات:
[I]. Authentication and access control: 1. Secure opportunistic data exchange using smart devices in 5G/LTE-A networks / Sumit Kumar Tetarave and Somanath Tripathy -- 2. Bloom filter based privacy preserving deduplication system / Jay Dave, Vijay Laxmi, Parvez Faruki, Manoj Gaur, and Bhavya Shah -- 3. A semantic notion of secure information-flow / N. V. Narendra Kumar and R. K. Shyamasundar -- 4. Bad signature identification in a batch using error detection codes / Apurva S. Kittur, Swapnil Kauthale, and Alwyn R. Pais -- 5. A solution to "confused deputy" problem using RWFM labels / Sandip Ghosal and R. K. Shyamasundar -- 6. BlockSLaaS : blockchain assisted secure logging-as-a-service for cloud forensics / Sagar Rane and Arati Dixit -- 7. Keystroke dynamics authentication using small datasets / Nataasha Raul, Royston D'mello, and Mandar Bhalerao -- 8. ARBAC : attribute-enabled role based access control model / Mahendra Pratap Singh, S. Sudharsan, and M. Vani
[II]. Malware analysis: 9. Malware signature generation using locality sensitive hashing / Hassan Naderi, P. Vinod, Mauro Conti, Saeed Parsa, and Mohammad Hadi Alaeiyan -- 10. DroidDivesDeep : Android malware classification via low level monitorable features with deep neural networks / Parvez Faruki, Bharat Buddhadev, Bhavya Shah, Akka Zemmari, Vijay Laxmi, and Manoj Singh Gaur -- 11. EvadePDF : towards evading machine learning based PDF malware classifiers / Sukanta Dey, Abhishek Kumar, Mehul Sawarkar, Pranav Kumar Singh, and Sukumar Nandi
[III]. Network security: 12. IP traceback in dynamic networks / Sangita Roy, Hardik Chawla, and Ashok Singh Sairam -- 13. Machine learning based approach to detect position falsification attack in VANETs / Pranav Kumar Singh, Shivam Gupta, Ritveeka Vashistha, Sunit Kumar Nandi, and Sukumar Nandi -- 14. Unsupervised person re-ID in surveillance feed using re-ranking / Mohit Kumar Singh, Vijay Laxmi, and Neeta Nain -- 15. An approach to meta-alert generation for anomalous TCP traffic / Deeksha Kushwah, Rajni Ranjan Singh, and Deepak Singh Tomar
[IV]. Privacy preservation: 16. APPLADroid : automaton based inter-app privacy leak analysis for Android / Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, and Mohamed Mosbah -- 17. Multiparty evaluation of finite state machine / Dhaneshwar Mardi and Jaydeep Howlader -- 18. An enhanced privacy-preserving recommender system / Pranav Verma, Harshul Vaishnav, Anish Mathuria, and Sourish Dasgupta -- 19. Threshold ring signature with message block sharing / Swati Rawal and Sahadeo Padhye
[V]. Secure software systems: 20. Testing program crash based on search based testing and exception injection / Faisal Anwer, Mohd. Nazir, and Khurram Mustafa
[VI]. Social network analytics: 21. Fuzzy string matching algorithm for spam detection in Twitter / Alok Kumar, Maninder Singh, and Alwyn Roshan Pais
ملخص:This book constitutes the refereed proceedings of the Second International Conference on Security and Privacy, ISEA-ISAP 2018, held in Jaipur, India, in January 2019. The conference was originally planned to be held in 2018 which is why the acronym contains "2018". The 21 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections: authentication and access control, malware analysis, network security, privacy preservation, secure software systems and social network analytics. -- Provided by publisher
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 S438 2019 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30030000000846
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 S438 2019 (إستعراض الرف(يفتح أدناه)) C.1 المتاح 30030000000847

Includes author index

[I]. Authentication and access control: 1. Secure opportunistic data exchange using smart devices in 5G/LTE-A networks / Sumit Kumar Tetarave and Somanath Tripathy -- 2. Bloom filter based privacy preserving deduplication system / Jay Dave, Vijay Laxmi, Parvez Faruki, Manoj Gaur, and Bhavya Shah -- 3. A semantic notion of secure information-flow / N. V. Narendra Kumar and R. K. Shyamasundar -- 4. Bad signature identification in a batch using error detection codes / Apurva S. Kittur, Swapnil Kauthale, and Alwyn R. Pais -- 5. A solution to "confused deputy" problem using RWFM labels / Sandip Ghosal and R. K. Shyamasundar -- 6. BlockSLaaS : blockchain assisted secure logging-as-a-service for cloud forensics / Sagar Rane and Arati Dixit -- 7. Keystroke dynamics authentication using small datasets / Nataasha Raul, Royston D'mello, and Mandar Bhalerao -- 8. ARBAC : attribute-enabled role based access control model / Mahendra Pratap Singh, S. Sudharsan, and M. Vani

[II]. Malware analysis: 9. Malware signature generation using locality sensitive hashing / Hassan Naderi, P. Vinod, Mauro Conti, Saeed Parsa, and Mohammad Hadi Alaeiyan -- 10. DroidDivesDeep : Android malware classification via low level monitorable features with deep neural networks / Parvez Faruki, Bharat Buddhadev, Bhavya Shah, Akka Zemmari, Vijay Laxmi, and Manoj Singh Gaur -- 11. EvadePDF : towards evading machine learning based PDF malware classifiers / Sukanta Dey, Abhishek Kumar, Mehul Sawarkar, Pranav Kumar Singh, and Sukumar Nandi

[III]. Network security: 12. IP traceback in dynamic networks / Sangita Roy, Hardik Chawla, and Ashok Singh Sairam -- 13. Machine learning based approach to detect position falsification attack in VANETs / Pranav Kumar Singh, Shivam Gupta, Ritveeka Vashistha, Sunit Kumar Nandi, and Sukumar Nandi -- 14. Unsupervised person re-ID in surveillance feed using re-ranking / Mohit Kumar Singh, Vijay Laxmi, and Neeta Nain -- 15. An approach to meta-alert generation for anomalous TCP traffic / Deeksha Kushwah, Rajni Ranjan Singh, and Deepak Singh Tomar

[IV]. Privacy preservation: 16. APPLADroid : automaton based inter-app privacy leak analysis for Android / Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, and Mohamed Mosbah -- 17. Multiparty evaluation of finite state machine / Dhaneshwar Mardi and Jaydeep Howlader -- 18. An enhanced privacy-preserving recommender system / Pranav Verma, Harshul Vaishnav, Anish Mathuria, and Sourish Dasgupta -- 19. Threshold ring signature with message block sharing / Swati Rawal and Sahadeo Padhye

[V]. Secure software systems: 20. Testing program crash based on search based testing and exception injection / Faisal Anwer, Mohd. Nazir, and Khurram Mustafa

[VI]. Social network analytics: 21. Fuzzy string matching algorithm for spam detection in Twitter / Alok Kumar, Maninder Singh, and Alwyn Roshan Pais

Available to OhioLINK libraries

This book constitutes the refereed proceedings of the Second International Conference on Security and Privacy, ISEA-ISAP 2018, held in Jaipur, India, in January 2019. The conference was originally planned to be held in 2018 which is why the acronym contains "2018". The 21 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections: authentication and access control, malware analysis, network security, privacy preservation, secure software systems and social network analytics. -- Provided by publisher

اضغط على الصورة لمشاهدتها في عارض الصور

صورة الغلاف المحلية
شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة