Proceedings of International Ethical Hacking Conference 2018, 1st ed. 2019
eHaCON 2018, Kolkata, India

Advances in Intelligent Systems and Computing Series, Vol. 811

Language: English

Approximative price 158.24 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
Publication date:
Support: Print on demand

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

Chapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM)
Chapter 2.OnlineKALI: Online Vulnerability Scanner
Chapter 3.Towards an AI-Chatbot driven Advanced Digital Locker
Chapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environment
Chapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment
Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment
Chapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm
Chapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance Computing
Chapter 9.A Novel Approach of Image Steganography with Encoding and Location Selection
Chapter 10.Image Encryption using Pseudorandom Permutation
Chapter 11.Authentication of Diffie-Hellman Protocol against Man– in-the-Middle Attack Using Cryptographically Secure CRC
Chapter 12.Analysis on Data Hiding In Images Using Different Image Steganography Approaches
Chapter 13.Multiple RGB Image Steganography using Arnold and Discrete Cosine Transformation
Chapter 14.Brain-Computer Interface Based Fear Detection: A Self Defense Mechanism
Chapter 15.Modelling and Simulation of Proton Exchange Membrane Fuel Cell for Stand-Alone System
Chapter 16.Hardware Realization of Power Adaptation Technique for Cognitive Radio Sensor Node
Chapter 17.Driven by the need for a reliable and cost effective LED driver
Chapter 18.SGSQoT: A Community based Trust Management Scheme in Internet of Things
Chapter 19.A novel trust evaluation model based on data freshness in WBAN
Chapter 20.CREnS: A Convolutional Coder Based Encryption Algorithm for Tiny Embedded Cognitive Radio Sensor Node
Chapter 21.Bilingual machine translation: English to Bengali
Chapter 22.Comparison of Different Classification Techniques Using Different Datasets
Chapter 23.An Algorithmic Approach for Generating Quantum Ternary Superposition Operators and Related Performance Measures
Chapter 24.A Survey on Collaborative Filtering: Tasks, Approaches and Applications
Chapter 25.Feature subset selection of semi-supervised data: An Intuitionistic Fuzzy-Rough set based concept
Chapter 26.An efficient Indoor Occupancy Detection System using Artificial Neural Network
Chapter 27.Real-time Facial Recognition using Deep Learning and Local Binary Patterns
Chapter 28.Hepatocellular Carcinoma Survival Prediction Using Deep Neural Network
Chapter 29.Detection and Retrieval of colored object from a Live Video Stream with Mutual Information
Chapter 30.A Machine Learning Framework for Recognizing Hand Written Digits Using Convexity Based Feature Vector Encoding
Chapter 31.A Secure Framework for IoT-Based Healthcare System
Chapter 32.SMART IRRIGATION: IOT Based Irrigation Monitoring System
Chapter 33.Secure data transmission beyond Tier 1 of medical body sensor network
Chapter 34.Multi-Target Based Cursor Movement in Brain Computer Interface using CLIQUE Clustering
Chapter 35.Data Mining in High Performance Computing: A Survey of Related Algorithms
Chapter 36.Personalized Product Recommendation Using Aspect Based Opinion Mining of Reviews
Chapter 37.Quantitative Rainfall Prediction: Deep Neural Network based approach
Chapter 38.Prediction of Benzene Concentration of Air in Urban Area Using Deep Neural Network
Chapter 39.Rough Set Based Feature Subset Selection Technique using Jaccard's Similarity Index
Chapter 40.An Approach towards Development of a Predictive Model for Female Kidnapping in India using R Programming

Mohuya Chakraborty presently holds the post of professor and head of the department of Information Technology, Institute of Engineering & Management (IEM), Kolkata. She also holds the post of head of Human Resource Development Centre, IEM. She has done B.Tech and M. Tech from the Institute of Radio Physics and Electronics, Calcutta University in the year 1994 and 2000 respectively and PhD (Engg.) in the field of Mobile Computing from Jadavpur University in 2007. She is the recepient of prestigious Paresh Lal Dhar Bhowmik Award. She is the member of editorial board of several International journals. She has published 3 patents and over 80 research papers in reputed International journals and conferences. She has handled many research projects funded by the DST, AICTE, CSIR and NRDC, and has published a number of papers in high-impact journals. Her research areas include network security, cognitive radio, brain computer interface, parallel computing etc. She is a member of IEEE Communication Society, IEEE Computer Society and IEEE Computational Intelligence Society as well as the faculty adviser of IEEE Communication Society and IEEE Computational Intelligence Student Branch Chapters of IEM , Kolkata Section. 

Satyajit Chakrabarti is Pro-Vice Chancellor, University of Engineering & Management, Kolkata and Jaipur Campus, India and Director of Institute of Engineering & Management, IEM. As the Director of one of the most reputed organizations in Engineering & Management in Eastern India, he launched a PGDM Programme to run AICTE approved Management courses, Toppers Academy to train students for certificate courses, and Software Development in the field of ERP solutions. Dr. Chakrabarti was Project Manager in TELUS, Vancouver, Canada from February 2006 to September 2009, where he was intensively involved in planning, execution, monitoring, communicating with stakeholders, negotiating with vendors and

Provides new findings in the area of ethical hacking

Covers a variety of key areas, e.g. network security, cloud security, information security, mobile communications security, and cyber security

Evaluates the security of computer systems using penetration testing techniques