Skip to main content
  • Conference proceedings
  • © 2020

Cyber Security and Computer Science

Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings

Conference proceedings info: ICONCS 2020.

Buy it now

Buying options

eBook USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (58 papers)

  1. Front Matter

    Pages i-xvii
  2. Computer Security

    1. Front Matter

      Pages 1-1
    2. Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based on ISO/IEC-27001

      • Christopher A. Kanter-Ramirez, Josue A. Lopez-Leyva, Lucia Beltran-Rocha, Dominica Ferková
      Pages 3-13
    3. Performance Optimization of Layered Signature Based Intrusion Detection System Using Snort

      • Noor Farjana Firoz, Md. Taslim Arefin, Md. Raihan Uddin
      Pages 14-27
    4. Designing a New Hybrid Cryptographic Model

      • Burhan Selçuk, AyÅŸe Nur A. Tankül
      Pages 28-42
  3. Malware Analysis

    1. Front Matter

      Pages 57-57
    2. Android Malware Detection by Machine Learning Apprehension and Static Feature Characterization

      • Md Rashedul Hasan, Afsana Begum, Fahad Bin Zamal, Lamisha Rawshan, Touhid Bhuiyan
      Pages 59-71
    3. Analysis of Agent-Based and Agent-Less Sandboxing for Dynamic Malware Analysis

      • Md. Zaki Muzahid, Mahsin Bin Akram, A. K. M. Alamgir
      Pages 72-84
    4. A Large-Scale Investigation to Identify the Pattern of Permissions in Obfuscated Android Malwares

      • Md. Omar Faruque Khan Russel, Sheikh Shah Mohammad Motiur Rahman, Takia Islam
      Pages 85-97
  4. Image Steganography and Risk Analysis on Web Applications

    1. Front Matter

      Pages 99-99
    2. A New 8-Directional Pixel Selection Technique of LSB Based Image Steganography

      • Sheikh Thanbir Alam, Nusrat Jahan, Md. Maruf Hassan
      Pages 101-115
    3. An Enhancement of Kerberos Using Biometric Template and Steganography

      • Munira Tabassum, Afjal H. Sarower, Ashrafia Esha, Md. Maruf Hassan
      Pages 116-127
    4. A Vulnerability Detection Framework for CMS Using Port Scanning Technique

      • Md. Asaduzzaman, Proteeti Prova Rawshan, Nurun Nahar Liya, Muhmmad Nazrul Islam, Nishith Kumar Dutta
      Pages 128-139
    5. A Risk Based Analysis on Linux Hosted E-Commerce Sites in Bangladesh

      • Rejaul Islam Royel, Md. Hasan Sharif, Rafika Risha, Touhid Bhuiyan, Md. Maruf Hassan, Md. Sharif Hassan
      Pages 140-151
  5. Optimization Problems

    1. Front Matter

      Pages 153-153
    2. T-way Strategy for (Sequence Less Input Interaction) Test Case Generation Inspired by Fish Swarm Searching Algorithm

      • Mostafijur Rahman, Dalia Sultana, Khandker M Qaiduzzaman, Md. Hasibul Hasan, R. B. Ahmad, Rozmie Razif Othaman
      Pages 155-166
    3. A Modified Particle Swarm Optimization for Autonomous UAV Path Planning in 3D Environment

      • Golam Moktader Nayeem, Mingyu Fan, Shanjun Li, Khalil Ahammad
      Pages 180-191
    4. A New Approach to Solve Quadratic Equation Using Genetic Algorithm

      • Bibhas Roy Chowdhury, Md. Sabir Hossain, Alve Ahmad, Mohammad Hasan, Md. Al-Hasan
      Pages 192-204

Other Volumes

  1. Cyber Security and Computer Science

About this book

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020.
The 58 full papers were carefully reviewed and selected from 133 submissions.
The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems; image steganography and risk analysis on web applications; machine learning in disease diagnosis and monitoring; computer vision and image processing in health care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing.

Editors and Affiliations

  • Daffodil International University, Dhaka, Bangladesh

    Touhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali

Bibliographic Information

Buy it now

Buying options

eBook USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access