Advanced Smart Computing Technologies in Cybersecurity and Forensics
Person/Institution:
Publisher:
Taylor & Francis Group
Place of publication:
Milton
Date:
2021
Extent, illustration, format:
1 online resource (258 pages)
Language:
Englisch
Providing institution:
Additional information
Abstract:
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgments -- Chapter 1: Detection of Cross-Site Scripting and Phishing Website Vulnerabilities Using Machine Learning -- 1.1 Introduction -- 1.2 Related Work -- 1.3 Implementation -- 1.4 Phishing Websites Detection -- 1.4.1 Phishing Websites -- 1.4.2 Phishing Websites Detection Techniques -- 1.5 Implementation Flowchart ( Figure 1.2) -- 1.5.1 Dataset -- 1.5.2 Classifiers -- 1.6 Result and Discussion -- 1.7 Conclusion and Future Work -- References -- Conferences -- Online Documents/Resources -- Chapter 2: A Review: Security and Privacy Defensive Techniques for Cyber Security Using Deep Neural Networks (DNNs) -- 2.1 Introduction -- 2.1.1 Pixel Restoration -- 2.1.2 Deep Dreaming -- 2.1.3 Image-Language Translations -- 2.1.4 Virtual Assistants -- 2.1.5 Fraud Detection -- 2.1.6 Automatic Handwriting -- 2.1.7 Healthcare -- 2.2 Related Work -- 2.3 Deep Learning Models for Cyber Security -- 2.3.1 Convolutional Neural Networks (Conv Nets) -- 2.3.2 Recurrent Neural Networks (RNNs) -- 2.3.3 Generative Adversarial Networks (GANs) -- 2.4 Cyber Attacks and Threats with Deep Neural Network -- 2.5 Conclusion -- References -- Chapter 3: DNA-Based Cryptosystem for Connected Objects and IoT Security -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Theory and Background -- 3.3.1 Cryptography -- 3.3.2 DNA-Based Cryptography -- 3.3.3 Huffman Compression -- 3.4 Proposed Cryptosystem-Based DNA -- 3.4.1 Specifications Presentation -- 3.4.2 Encryption Process -- 3.4.2.1 Consideration for the Key Generation -- 3.4.2.2 Phases of Encryption Process -- 3.4.3 Decryption Process -- 3.4.4 Security Evaluation -- 3.4.4.1 Frequency Analysis -- 3.4.4.2 Encryption Key Security Analysis -- 3.4.4.3 Entropy of the Encryption Key -- 3.5 Cryptosystem Hardware Implementation.
Object text:
Description based on publisher supplied metadata and other sources
Access and usage options
Contact
Universität Erfurt
Forschungsbibliothek Gotha
Schloss Friedenstein
Schlossplatz 1
99867 Gotha
+49 361 737-5540
bibliothek.gotha(at)uni-erfurt.de
Forschungsbibliothek Gotha
Schloss Friedenstein
Schlossplatz 1
99867 Gotha
+49 361 737-5540
bibliothek.gotha(at)uni-erfurt.de
Administrative details
Created:
2023-04-13
Last changed:
2022-08-04
Added to portal:
2023-04-13
Feedback
Our data sets are in constant development. If you have additional information about this object or discovered an error, please write to us. Information on privacy policy