Advanced smart computing technologies in cybersecurity and forensics / (Record no. 654291)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02787cam a22002538i 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780367686505 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780367690137 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23/eng/20211007 |
Item number | KAU |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Kaushik, Keshav |
245 00 - TITLE STATEMENT | |
Title | Advanced smart computing technologies in cybersecurity and forensics / |
Statement of responsibility, etc | edited by Keshav Kaushik, Shubham Tayal, Akashdeep Bhardwaj, and Manoj Kumar. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Boca Raton |
Name of publisher | CRC Press |
Year of publication | 2022 |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | pages cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Detection of cross site scripting and phishing website vulnerabilities using machine learning / Sunil Sikka, Charu Jain, Aarti Chugh -- A review : security and privacy defensive techniques for cyber security using deep neural networks (DNNs) / Prachi Chauhan, Hardwari Lal Mandoria, Alok Negi -- DNA-based cryptosystem for connected objects and IoT security / Belhorma Brahim, Bouhedda Mounir, Bengherbia Billel, Benzineb Omar -- A role of digital evidence : mobile forensics data / G Maria Jones, S Godfrey Winster, L Ancy Geoferla -- Analysis of kernel vulnerabilities using machine learning / Supriya Raheja, Rakesh Garg, Bhavya Gururani -- Cyber threat exploitation and growth during Covid-19 times / Romil Rawat, Anand Singh Rajawat, Vinod Mahor, Bhagwati Garg -- An overview of the cybersecurity in smart cities in the modern digital age / Reinaldo Padilha, Ana Carolina Borges Monteiro -- The fundamentals and potential for cyber security of machine learning in the modern world / Reinaldo Padilha, Ana Carolina Borges Monteiro -- Qualitative and quantitative evaluation of encryption algorithms / Supriya Raheja, Rakesh Garg, Durgesh Pandey -- Analysis and investigation of advanced malware forensics / Apirajitha P. S., Punitha S, Thompson Stephan -- Network intrusion detection system using naïve Bayes classification technique for anomaly detection / Sam Goundar, Manveer Singh, Rahul Chand, Akashdeep Bhardwaj -- Data security analysis in mobile cloud computing for cyber security / Sam Goundar, Akashdeep Bhardwaj -- A critical review of legal and technical challenges during preliminary investigations of suspects of cyber crimes / Joshua Nehinbe -- Fault analysis techniques in lightweight ciphers for IoT devices / Priyanka Joshi, Bodhisatwa Mazumdar. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "This book addresses the topics related to artificial intelligence, internet of things, blockchain technology, and machine learning and brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer crimes |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kaushik, Keshav, |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Tayal, Shubham, |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Bhardwaj, Akashdeep, |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kumar, Manoj |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Withdrawn status | Lost status | Damaged status | Not for loan | Home Library | Current Location | Shelving location | Date acquired | Full call number | Accession Number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
Dept. of Computer Science | Dept. of Computer Science | Reference | 11/08/2022 | 005.8 KAU | DCS4969 | 11/08/2022 | Book |