Chapter 1. A systematic approach for analyzing log files based on string matching regular expressions.- Chapter 2. An efficient detection and prevention approach of unknown malicious attack: A novel honeypot approach.- Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare System in Uttarakhand.- Chapter 4. Android Malware Detection using Extreme Learning Machine optimized with Swarm Intelligence.- Chapter 5. Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform.- Chapter 6. Authentication of Digital Media using Reversible Watermarking.- Chapter 7. Automatic Test Case Generation and Fault Tolerant Framework Based on N Version and Recovery Block Mechanism.- Chapter 8. Chatbot to Map Medical Prognosis and Symptoms using Machine Learning.- Chapter 9. Cloud Security: The Future of Data Storage.- Chapter 10. Curbing Criminal Acts on Mobile Phone Network.- Chapter 11. Designing of Fuzzy logic-based Intrusion detection system (FIDS) for detection of Blckhole attack in AODV for MANETs.- Chapter 12. Detection of Phishing Websites Using Classification Algorithms.- Chapter 13. IoT Based Smart Security System for Agriculture Fields.- Chapter 14. Efficient Clustering of Transactional data for Privacy-Preserving Data Publishing.- Chapter 15. Passive Video Forgery Detection Techniques to Detect Copy Move Tampering through Feature Comparison and RANSAC.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.