Advanced Smart Computing Technologies in Cybersecurity and Forensics
Person/Institution:
Verlag:
Taylor & Francis Group
Veröffentlichungsort:
Milton
Entstehungszeit:
2021
Umfang, Illustration, Format:
1 online resource (258 pages)
Sprache:
Englisch
Bereitstellende Institution:
Weitere Objektinformationen
Abstract:
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgments -- Chapter 1: Detection of Cross-Site Scripting and Phishing Website Vulnerabilities Using Machine Learning -- 1.1 Introduction -- 1.2 Related Work -- 1.3 Implementation -- 1.4 Phishing Websites Detection -- 1.4.1 Phishing Websites -- 1.4.2 Phishing Websites Detection Techniques -- 1.5 Implementation Flowchart ( Figure 1.2) -- 1.5.1 Dataset -- 1.5.2 Classifiers -- 1.6 Result and Discussion -- 1.7 Conclusion and Future Work -- References -- Conferences -- Online Documents/Resources -- Chapter 2: A Review: Security and Privacy Defensive Techniques for Cyber Security Using Deep Neural Networks (DNNs) -- 2.1 Introduction -- 2.1.1 Pixel Restoration -- 2.1.2 Deep Dreaming -- 2.1.3 Image-Language Translations -- 2.1.4 Virtual Assistants -- 2.1.5 Fraud Detection -- 2.1.6 Automatic Handwriting -- 2.1.7 Healthcare -- 2.2 Related Work -- 2.3 Deep Learning Models for Cyber Security -- 2.3.1 Convolutional Neural Networks (Conv Nets) -- 2.3.2 Recurrent Neural Networks (RNNs) -- 2.3.3 Generative Adversarial Networks (GANs) -- 2.4 Cyber Attacks and Threats with Deep Neural Network -- 2.5 Conclusion -- References -- Chapter 3: DNA-Based Cryptosystem for Connected Objects and IoT Security -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Theory and Background -- 3.3.1 Cryptography -- 3.3.2 DNA-Based Cryptography -- 3.3.3 Huffman Compression -- 3.4 Proposed Cryptosystem-Based DNA -- 3.4.1 Specifications Presentation -- 3.4.2 Encryption Process -- 3.4.2.1 Consideration for the Key Generation -- 3.4.2.2 Phases of Encryption Process -- 3.4.3 Decryption Process -- 3.4.4 Security Evaluation -- 3.4.4.1 Frequency Analysis -- 3.4.4.2 Encryption Key Security Analysis -- 3.4.4.3 Entropy of the Encryption Key -- 3.5 Cryptosystem Hardware Implementation.
Objekttext:
Description based on publisher supplied metadata and other sources
Zugriff und Nutzungsmöglichkeiten
Kontaktinformationen
Universität Erfurt
Forschungsbibliothek Gotha
Schloss Friedenstein
Schlossplatz 1
99867 Gotha
+49 361 737-5540
bibliothek.gotha(at)uni-erfurt.de
Forschungsbibliothek Gotha
Schloss Friedenstein
Schlossplatz 1
99867 Gotha
+49 361 737-5540
bibliothek.gotha(at)uni-erfurt.de
Administrative Angaben
Datensatz angelegt am:
2023-04-13
Zuletzt geändert am:
2022-08-04
In Portal übernommen am:
2023-04-13
Feedback
Unsere Datensätze befinden sich in stetiger Weiterentwicklung. Wenn Sie zusätzliche Informationen zu diesem Objekt oder einen Fehler entdeckt haben, dann schreiben Sie uns. Informationen zum Datenschutz