Coverart for item
The Resource Advanced Computing and Systems for Security : Volume 1

Advanced Computing and Systems for Security : Volume 1

Label
Advanced Computing and Systems for Security : Volume 1
Title
Advanced Computing and Systems for Security
Title remainder
Volume 1
Creator
Contributor
Subject
Language
eng
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
Advances in Intelligent Systems and Computing Ser.
Series volume
v.395
Advanced Computing and Systems for Security : Volume 1
Label
Advanced Computing and Systems for Security : Volume 1
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4084538
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface -- Contents -- About the Editors -- Part ISecurity -- 1 Computer User Profiling Based on Keystroke Analysis -- Abstract -- 1 Introduction -- 2 Reference Data Sets -- 2.1 Issues Related to Data Sets -- 2.2 Data Acquisition -- 3 Data Analysis -- 4 User Profiling -- 4.1 Time Dependencies Extraction -- 4.2 Outliers Elimination -- 4.3 Creating Feature Vectors -- 4.4 Feature Vector -- 5 The Results Obtained -- 5.1 Tuning the Parameters -- 5.2 The Final Results -- 6 Conclusions and Future Work -- Acknowledgments -- References -- 2 Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems -- Abstract -- 1 Introduction -- 2 HRV Background -- 3 State-of-the-Art Heart-Based Biometrics -- 4 Proposed System -- 4.1 Block Diagram -- 4.2 R--R Interval Acquisition -- 4.3 Database Specification -- 4.4 Feature Set Generation -- 4.5 Feature Selection Algorithms -- 5 Results and Discussions -- 6 Conclusions and Future Directions -- Acknowledgments -- Appendix A -- References -- 3 Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over Galois Field GF(73) -- Abstract -- 1 Introduction -- 2 Algebraic Method to Find Multiplicative Polynomial Inverse Over GF(73) -- 2.1 Multiplicative Polynomial Inverse Over GF(73) -- 2.2 Algorithm to Find the Multiplicative Polynomial Inverses Over GF(73) -- 2.3 Calculating Multiplicative Polynomial Inverse of (x2 + x + 6) Over GF(73) Under an Irreducible Polynomial (x3 + 2x2 + 6x + 1) -- 3 Brief Description of RC4 Algorithm -- 4 Purpose of NIST Statistical Randomness Testing Algorithms -- 4.1 Frequency Test -- 4.2 Frequency Test Within a Block -- 4.3 Runs Test -- 4.4 Longest Run of Ones in a Block Test -- 4.5 Binary Matrix Rank Test -- 4.6 Discrete Fourier Transform Test -- 4.7 Nonoverlapping Template Matching Test -- 4.8 Overlapping Template Matching Test
  • 4.9 Maurer's Ù̀niversal Statistical'' Test -- 4.10 Linear Complexity Test -- 4.11 Serial Test -- 4.12 Approximate Entropy Test -- 4.13 Cumulative Sums Test -- 4.14 Random Excursions Test -- 4.15 Random Excursions Variant Test -- 5 Proposed Dynamic Ciphering Algorithm DC15 -- 6 Results of Comparative Statistical Randomness Testing -- 6.1 EPOP and Observed Proportion of Passing (OPOP) -- 6.2 P-value of P-values (POP) and Uniformity of Distribution of P-values -- 6.3 Results of Comparative Study Between RC4 and DC15 -- 7 Conclusion -- Acknowledgments -- References -- 4 On Preventing SQL Injection Attacks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Problem Description -- 4 Proposed Approaches -- 4.1 Query Rewriting Approach -- 4.2 Encoding-Based Approach -- 4.3 Extending Encoding-Based Approach to Database Spplications -- 4.4 Assertion-Based Approach -- 5 Discussion and Complexity Analysis -- 6 Conclusion -- References -- 5 Securing Service in Remote Healthcare -- Abstract -- 1 Introduction -- 2 Background of Proposed Work -- 2.1 Literature Survey -- 2.2 Compatibility Checking with Major Standards of Healthcare -- 2.3 Scope of Work -- 3 Proposed Work -- 3.1 Procedure of Securing Major Service in Remote Healthcare -- 3.2 Identity Management Service in Remote Healthcare -- 3.3 Procedure of Hybrid Encoding Logic in Remote Healthcare -- 4 Analysis -- 5 Conclusion -- Part IISystems Biology -- 6 Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Preliminary of ANN and CS -- 2.2 Neural-Cuckoo Hybrid Approach -- 3 Experimental Result -- 4 Conclusion -- References -- 7 Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Diabetic Retinopathy
  • 4 Retinal Vessel Extraction and Its Image Classification -- 4.1 Vessel Extraction by the Wavelet Transform -- 4.2 Detection of the Diabetic Retinal Images by the Feedforward Neural Network -- 5 Result and Discussion -- 6 Conclusion and Scope of Future Work -- References -- 8 Liver Fibrosis Diagnosis Support System Using Machine Learning Methods -- Abstract -- 1 Introduction -- 2 Data Characteristics -- 3 Machine Learning -- 3.1 Feature Selection -- 3.2 Classification -- 4 Results -- 5 Conclusions -- Acknowledgments -- References -- 9 Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Scope of Research Work -- 4 Overview of DNA Computation -- 5 Background of DNA Cryptography -- 5.1 Transcription -- 5.2 Translation -- 6 Modeling a Pseudo DNA-Based Symmetric Cryptosystem -- 6.1 Symmetric Cryptography Principles -- 6.2 Communications Using Pseudo DNA Symmetric cryptography -- 6.3 Key Generation Using Splicing Systems -- 6.3.1 Key Selection Using Splicing Systems -- 7 Modeling an Application (Public Key Cryptography) Using Pseudo DNA Symmetric Cryptosystem -- 7.1 DNA-Assembled Public Key Cryptography -- 8 Security Analysis -- 8.1 Formal Definitions of Semantic Security (SS) and Message Indistinguishability (MI) -- 8.2 Encryption Algorithm -- 9 Cipher Text Indistinguishability -- 9.1 Indistinguishability of IND-CCA1 or IND-CCA2 -- 10 Results and Simulations Analysis -- 11 Conclusion -- References -- 10 Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment -- Abstract -- 1 Introduction -- 2 Proposed Algorithm -- 2.1 Initial Generation -- 2.2 Fitness -- 2.3 Child Generation -- 2.3.1 Selection -- 2.3.2 Crossover -- 2.3.3 Mutation -- 2.4 Termination Condition -- 3 Test Dataset -- 4 Experimental Study
  • 4.1 Effect of Operators and Fitness Function -- 4.2 Comparing Proposed Method with Existence Methods -- 5 Conclusion -- Acknowledgments -- References -- 11 A Comparative Analysis of Image Segmentation Techniques Toward Automatic Risk Prediction of Solitary Pulmonary Nodules -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Contributions -- 3 Methodology -- 3.1 Image Segmentation -- 3.2 Risk Prediction Using Multiclass SVM -- 4 Results and Discussions -- 4.1 Experimental Dataset -- 4.2 Ground Truth Image Creation -- 4.3 Comparative Study of Image Segmentation -- 4.4 Feature Extraction -- 4.5 Result of Classification -- 4.6 Data Validation -- 5 Conclusion -- Acknowledgments -- References -- Part IIINetworking and Cloud Computing -- 12 Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Novelty of Our Contribution -- 4 User Authentication Framework for Cloud -- 4.1 Components of the Framework -- 5 Authentication Architectures -- 5.1 Broker-Based Authentication Architecture -- 5.2 Direct Authentication-Based Architecture -- 6 Authentication Protocols -- 6.1 Protocol for Broker-Based Authentication Using Password as the First Factor and Smart Card as the Second Factor -- 6.2 Protocol for Broker-Based Authentication Using Password as the First Factor and Mobile Phone as the Second Factor -- 6.3 Protocol for Direct Authentication Using Smart Card/Crypto Card/Audio Pass as the Second Factor -- 7 Conclusion and Future Work -- References -- 13 KPS: A Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Protocol -- 4 Results -- 5 Conclusions and Future Work -- References -- 14 The Design of Hierarchical Routing Protocol for Wireless Sensor Network -- Abstract
  • 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Basic Method -- 3.2 Algorithm -- 4 Simulation Result -- 5 Conclusion -- References -- 15 Network Selection Using AHP for Fast Moving Vehicles in Heterogeneous Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed AHP Based Network Selection Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Part IVData Analytics -- 16 Context-Aware Graph-Based Visualized Clustering Approach (CAVCA) -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Visualized Clustering Approach (VCA) -- 4 Proposed Method -- 4.1 Context-Aware-Based Hypergraph Similarity Measures (CAHSM) -- 4.2 Context-Aware Dissimilarity Matrix-Based Visualized Clustering Procedure (CAVCA) -- 5 Experimental Study and Results and Discussion -- 5.1 Datasets Description -- 5.2 Results and Discussion -- 5.3 Performance Evaluation and Comparison -- 6 Conclusion and Future Scope -- References -- 17 Materialized View Construction Using Linearizable Nonlinear Regression -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Why Is Nonlinear Regression Required in This Context? -- 4 Proposal of Linearizable Nonlinear Regression -- 5 Illustration by Example -- 6 Performance -- 7 Conclusion -- References -- Author Index
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9788132226505&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4384075'}
Extent
1 online resource (275 pages)
Form of item
online
Isbn
9788132226505
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...