𝔖 Scriptorium
✩   LIBER   ✩

📁

Cybersecurity and Evolutionary Data Engineering: Select Proceedings of the 2nd International Conference, ICCEDE 2022 (Lecture Notes in Electrical Engineering, 1073)

✍ Scribed by Raj Jain (editor), Carlos M. Travieso (editor), Sanjeev Kumar (editor)


Publisher
Springer
Year
2023
Tongue
English
Leaves
377
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book comprises the select proceedings of the 2nd International Conference on Cybersecurity and Evolutionary Data Engineering (ICCEDE 2022). The contents highlight cybersecurity and digital forensics, evolutionary data engineering, and data management for secure contemporary applications. It includes papers on data models, semantics, query language; AI-driven industrial automation, ERP, CRM data security; authentication and access control; cyberspace structure and models; and drone large data filtration, cleansing, and security, among others. This book is of immense interest to researchers in academia and industry working in the fields of electronics and data engineering.

✩ Table of Contents


Organizations
Preface
Keynotes
Contents
Editors and Contributors
Cybersecurity and Digital Forensic
Current Status of Challenges in Data Security: A Review
1 Introduction
2 Literature Survey
3 Data Mining Techniques
4 Data Masking Techniques
5 Challenges in Data Security
6 Importance of Security and Privacy
7 Conclusion
References
Cyber Bullying: The Growing Menace in Cyber Space with Its Challenges and Solutions
1 Introduction
1.1 Definitions of Bullying
1.2 Types of Bullying
2 Bullying on the Internet
3 Literature Review over Cyber Bullying
4 Governmental Efforts and Legislation Provision in Indian Perspective
4.1 The Nirbhaya Funds Scheme
4.2 Cybercrime Prevention Against Women and Children Scheme (CCPWC Scheme)
4.3 Indian Cybercrime Coordination Center (I4C) Scheme
4.4 The National Cyber Crime Reporting Portal (NCCR Portal)
5 Findings of the Survey
6 Conclusion and Future Scope
References
Hybrid Feature Extraction for Analysis of Network System Security—IDS
1 Introduction
2 Literature Survey
3 System Model
3.1 Feature Normalization
3.2 Feature Selection
4 Performance Evaluation
5 Conclusion
References
Stranger Trust Architecture: An Advancement to Zero Trust Architecture
1 Why a New Method?
2 Previous Works
3 Basics of Stranger Trust Model
4 Tenets of Stranger Trust
5 STA Features
5.1 Multi User Authentication
6 Conclusion
References
Genetic Algorithm Optimized SVM for DoS Attack Detection in VANETs
1 Introduction
2 Literature Review
3 Problem Statement: DoS Attack
3.1 Overwhelming the Node’s Resources
3.2 Channel Jamming
4 Dataset
5 Proposed System
5.1 Data Pre-processing
5.2 Feature Selection Using Genetic Algorithm
5.3 Fitness Function
6 Results
7 Conclusion and Future Work
References
Digital and IoT Forensic: Recent Trends, Methods and Challenges
1 Introduction
2 Forensics
3 Digital Forensics
3.1 Steps Involved in Digital Forensics Investigation
3.2 Current Digital Forensics Trends
3.3 Classification of Digital Forensics Concerns
4 IoT Forensic
4.1 Steps Involved in IoT Forensics
4.2 IoT Security Challenges
5 Conclusion
References
Cloud-Based Occlusion Aware Intrusion Detection System
1 Introduction
2 Proposed Work
2.1 Face Detection
2.2 Face Recognition
2.3 Deployment on Google Cloud
3 Experimental Results
4 Conclusion
References
Comparative Analysis of Web Application Based Encryption Methods
1 Introduction
2 Basic Theory and Methodologies
2.1 Login System
2.2 Encryption Method
2.3 Types of Encryptions
2.4 Generation of SHA512 Digest
3 Proposed Method
3.1 Vulnerability Analysis
3.2 Analysis for Needs and Betterment
3.3 Mitigate and Test
4 Result and Discussion
5 Conclusion
References
Linking of Ontologies for Composition of Semantic Web Services Using Knowledge Graph
1 Introduction
1.1 Web Services and Its Requirements
1.2 Semantic Web Services and Its Framework
2 Literature Review
3 Research Questions
4 Research Methodology
4.1 Preprocessing Module
4.2 Creation of Knowledge Graph (KG)
4.3 Discovery Phase
5 Results and Analysis
5.1 Reasoning Over KG of OWL-S Services
6 Conclusion and Future Scope
References
Fake Image Dataset Generation of Sign Language Using GAN
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 Pre-Processing and Heat Map
3.3 GAN Algorithm
3.4 Fake Image Dataset
4 Proposed Model
4.1 Algorithm of Proposed Model
4.2 Working of Proposed Model
5 Experiment Setup
5.1 Dataset Description
5.2 Experimental Testbed
6 Results
7 Conclusion and Future Work
References
Analysis of Multimodal Biometric System Based on ECG Biometrics
1 Introduction
2 ECG as Biometrics
2.1 ECG Biometrics Merits and Prime Challenges
2.2 Physiology of the ECG
2.3 ECG Datasets
3 Unimodal and Multimodal Biometrics
4 Multimodal Biometrics (Two Modalities)
5 Multimodal Biometrics with ECG (Two Modalities)
6 Multimodal Biometrics with ECG (Three Modalities)
7 Conclusion and Future Scope ECG Based Multimodal
References
Performance Analysis of Nature Inspired Optimization Based Watermarking Schemes
1 Introduction
2 Nature-Inspired Algorithms (NIAs) for Optimal Watermarking
2.1 Particle Swarm Optimization
2.2 Artificial Bee Colony (ABC)
2.3 Firefly Algorithm (FA)
3 Conclusion
References
Evolutionary Data Engineering Applications
A Review of Ensemble Methods Used in AI Applications
1 Introduction
2 Related Work
2.1 Bias-Variance Decomposition
2.2 Diversity
3 Ensemble Strategies
3.1 Bagging
3.2 Boosting
3.3 Stacking
3.4 Deep Ensemble Methods Use Negative Correlation
3.5 Explicit or Implicit Ensembles
3.6 Homogeneous or Heterogeneous Ensembles
4 Application of Ensemble Learning Methods
5 Conclusion and Future Scope
References
Stress Detection Based on Multimodal Data in a Classroom Environment
1 Introduction
2 Related Work
3 Methodology
3.1 Architecture
3.2 Module Description
4 Results
5 Conclusions and Future Work
References
Comparative Study of Different Generations of Mobile Network
1 Introduction
1.1 First Generation (1G)
1.2 Second Generation(2G)
1.3 Third Generation (3G)
1.4 Fourth Generation (4G)
1.5 Fifth Generation (5G)
1.6 Sixth Generation (6G)
2 Different Mobile Generation
3 Discussion and Future Scope
4 Conclusion
References
A Novel Framework for VM Selection and Placement in Cloud Environment
1 Introduction
2 Related Work
3 Proposed Work
4 Conclusion
References
Quad Clustering Analysis and Energy Efficiency Evaluation in Wireless Sensor Networks
1 Introduction
2 Literature Review
3 Quad Clustering
3.1 Quad Clusters Formation
3.2 Energy Formula
4 Quad Clusters Analysis and Performance Evaluation
4.1 Simulation Environment
4.2 Cluster Analysis
5 Conclusion
References
Artificial Intelligence in Gaming
1 Introduction
2 Artificial Intelligence
3 Review of Literature
4 Comparison
5 Conclusion
References
Analysis of Pulmonary Fibrosis Progression Using Machine Learning Approaches
1 Introduction
1.1 Basic Details
1.2 How Pulmonary Fibrosis is Diagnosed?
1.3 Different Procedures for Finding the Lung Tissue
2 Literature Review
3 Methodology
3.1 Formulation of FVC Slope
4 Result
5 Conclusion
6 Future Scope
References
Lung Conditions Prognosis Using CNN Model
1 Introduction
2 Research Objective
3 Methodology
4 Algorithm Working
5 Result Analysis
5.1 Dataset
5.2 Experiment Analysis
6 Conclusion
References
Stock Trend Prediction Using Candlestick Pattern
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 Date Pre-processing
3.3 Candlestick Identification Algorithm
3.4 Signal Generation
4 Proposed Model
4.1 Candlestick Patterns
5 Experimental Setup
5.1 Experiment Testbed
5.2 Dataset Description
6 Result
7 Conclusion and Future Work
References
Motion Based Real-Time Siamese Multiple Object Tracker Model
1 Introduction
2 Motion-Based Target Detection
3 Proposed Problem Identification
4 Literature Review
5 Proposed Methodology
5.1 Proposed Algorithm
5.2 Images and Date Set
6 Results
7 Discussion
8 Conclusion
9 Future Scopes
References
Design and Development of IOT & AI Enabled Smart Entrance Monitoring Device
1 Introduction
2 Related Work
3 Software and Hardware Specifications
3.1 Software Specifications
3.2 Hardware Specifications
4 Methodology
4.1 Face Mask Identification
4.2 Temperature Measuring
5 System Overview
6 Results and Discussion
7 Conclusion
References
Sunlight-based Framework: An Approach for Energy Efficiency in IoT Systems
1 Introduction
2 Need for Sunlight-Based Framework
3 Literature Review
4 Enabling Techniques
4.1 Temperature Sensors
4.2 Moisture Sensors
4.3 Light Sensors
4.4 Motion Sensors
4.5 Proximity Sensor
4.6 Node MCU
4.7 IR Sensors
4.8 Current Sensor
4.9 Solar Panel
5 Research Methodology
6 Proposed Model
7 Conclusion and Future Work
References
Metaverse Technologies and Applications: A Study
1 Introduction
1.1 Metaverse
1.2 Framework of Metaverse
1.3 Need for Metaverse
2 Literature Review
3 Technologies related to Metaverse
3.1 Augmented Reality and Virtual Reality
3.2 Artificial Intelligence
3.3 3-D Modelling
3.4 Edge Computing
3.5 Internet of Things (IoT)
4 Application Domains and Use Cases of the Metaverse
4.1 Advanced Blockchain Use Cases
4.2 Virtual Work and Learning Spaces
4.3 Virtual Business and Markets
4.4 Expansion in Social Media Platforms
5 Challenges of Metaverse Implementations
5.1 Ethical Issues
5.2 Security
5.3 Currency and Digital Payments
5.4 User Acceptance
6 Conclusion and Future Scope
References
Body Sensor Networking: A Case Study of Heart Pulse Detection and Alert System
1 Introduction
2 Technologies Used in BSN
3 Architecture of BSN
4 Proposed System to Detect Heartbeat and Generate Alerts
5 Challenges of BSN
5.1 Reliability
5.2 Privacy and Security
5.3 Portability
5.4 Energy Consumption
5.5 Sensitivity
5.6 Effect of Electronics on Human Body
6 Recent Research, Current Applications, and Use of Bsn in Different Industries
7 Conclusion
References
Brand Sentiment Analytics Using Flume
1 Introduction
2 MapReduce in Hadoop
3 SQOOP
3.1 Features And Limitations Of SQOOP
4 Hive
5 Conclusion
References
The ps: [/EMC pdfmark [/objdef Equ /Subtype /Span /ActualText (MathID2) /StPNE pdfmark [/StBMC pdfmarkto.ps: [/EMC pdfmark [/Artifact <> /BDC pdfmark λps: [/EMC pdfmark [/StBMC pdfmark ps: [/EMC pdfmark [/StPop pdfmark [/StBMC pdfmarkNF Problem
1 Introduction
1.1 NaĂŻve Solution
1.2 Hashing
1.3 Dijkstra's Solution
2 The Indian National Flag Problem
3 The Zimbabwean National Flag Problem
4 The National Flag with ps: [/EMC pdfmark [/objdef Equ /Subtype /Span /ActualText (MathID65) /StPNE pdfmark [/StBMC pdfmarkto.ps: [/EMC pdfmark [/Artifact <> /BDC pdfmark λps: [/EMC pdfmark [/StBMC pdfmark ps: [/EMC pdfmark [/StPop pdfmark [/StBMC pdfmark Colours
5 Conclusion
References
The Indian Search Algorithm
1 Introduction
2 Indo-Pellian Search
3 Indo-Fibonaccian Search
4 Conclusion
References
COVID-19's Influence on Buyers and Businesses
1 Introduction
2 Literature Review
3 Choice of Covariates and Dimensionality Reduction
3.1 Choice of Covariates
3.2 Dimensionality Reduction
4 Time Series Forecast for Economic Factors in Selected Regions
4.1 ARIMA Model
5 Model Training
6 Implementation
7 Results
8 Conclusion
8.1 Future Work
References
Exploring Textural Behavior of Novel Coronavirus (SARS–CoV-2) Through UV Microscope Images
1 Introduction
2 Background Information About the Novel Coronavirus
3 Information About Texture Parameters of the “Grey Level Co-Occurrence Matrix”
4 Related Work
5 Experimental Results
6 Conclusion
References


📜 SIMILAR VOLUMES


Proceedings of the 2nd International Con
✍ K. P. Ray (editor), Arati Dixit (editor), Debashis Adhikari (editor), Ribu Mathe 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This volume comprises the select proceedings of the 2nd International Conference on Signal &amp; Data Processing (ICSDP) 2022. The contents focus on the latest research and developments in the field of artificial intelligence &amp; machine learning, Internet of things (IoT), cybernetics, advan

Recent Advances in Electrical and Electr
✍ Bibhu Prasad Swain (editor), Uday Shanker Dixit (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book presents select proceedings of the International Conference on Science, Technology and Engineering (ICSTE 2023) related to electrical and electronic engineering. Various topics covered include neural network classification, text detection from natural scene images, speech processi

Proceedings of 2nd International Confere
✍ Sanjay Yadav (editor), Harish Kumar (editor), Pavan Kumar Kankar (editor), Wanya 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This volume comprises the select proceedings of the 2nd International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC 2022). The content focuses on big data and cloud computing and the application of artificial intelligence, robotics and engineering, the Internet

Information Security, Privacy and Digita
✍ Sankita J. Patel (editor), Naveen Kumar Chaudhary (editor), Bhavesh N. Gohil (ed 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022). The content discusses novel contributions and latest developments in cyber-attacks and defenses, computer forensics and cybersecurity database

Advances in Renewable Energy & Electric
✍ Suryanarayana Kajampady (editor), Shripad T. Revankar (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book presents select peer-reviewed proceedings of the International Conference on Advances in Renewable Energy and Electric Vehicles (AREEV 2022). The topics covered include renewable energy sources, electric vehicles, energy storage systems, power system protection &amp; security, sma