Skip to main content
  • Conference proceedings
  • © 2018

Cyber Security

Proceedings of CSI 2015

  • Enhances awareness about cyber security
  • Brings forth learnings from skilled industry experts, academicians, and researchers
  • Covers national and international collaborations and cooperation in cyber security as an essential element of overall security of the system

Part of the book series: Advances in Intelligent Systems and Computing (AISC, volume 729)

Conference series link(s): CSI: National Conference of the Computer Society of India

Conference proceedings info: CSI 2015.

Buy it now

Buying options

Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Table of contents (48 papers)

  1. Front Matter

    Pages i-xxiii
  2. An Improved RED Algorithm with Input Sensitivity

    • Kiran Chhabra, Manali Kshirsagar, Arun Zadgaonkar
    Pages 35-45
  3. Security Attacks in Wireless Sensor Networks: A Survey

    • Prachi Dewal, Gagandeep Singh Narula, Vishal Jain, Anupam Baliyan
    Pages 47-58
  4. Symmetric Key Encryption Technique: A Cellular Automata Based Approach

    • Deepika Parashar, Satyabrata Roy, Nilanjan Dey, Vipin Jain, U. S. Rawat
    Pages 59-67
  5. A Comparative Study on Lightweight Cryptography

    • M. U. Bokhari, Shabbir Hassan
    Pages 69-79
  6. Data Security Model in Cloud Computing Environment

    • Meena Kumari, Rajender Nath
    Pages 91-100
  7. DNA-Based Cryptography for Security in Wireless Sensor Networks

    • Monika Poriye, Shuchita Upadhyaya
    Pages 111-118
  8. Privacy Preservation Using Various Anonymity Models

    • Deepak Narula, Pardeep Kumar, Shuchita Upadhyaya
    Pages 119-130
  9. A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks

    • Yamini Jain, Gaurav Sharma, Gaurav Anand, Sangeeta Dhall
    Pages 131-142
  10. Security in CryptDB Using Fine-Grained Access Controls with ECDHE-ZeroVi’s Framework

    • Krishna Keerthi Chennam, Akka Laskhmi Muddana, Tahseen Munnavara
    Pages 153-163
  11. Data Security and Encryption Technique for Cloud Storage

    • Sunil Kumar, Jayant Shekhar, Jatinder Paul Singh
    Pages 193-199

About this book

This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.

Editors and Affiliations

  • Department of Computer Science, Aligarh Muslim University, Aligarh, India

    M. U. Bokhari

  • National Institute of Financial Management, Faridabad, India

    Namrata Agrawal

  • Bharati Vidyapeeth’s College of Engineering (BVCOE), New Delhi, India

    Dharmendra Saini

About the editors

Prof. M. U. Bokhari is working as a Professor at Department of Computer Science, Aligarh Muslim University (AMU), Aligarh. He has published more than 110 research papers in reputed journals and conference proceedings. He has also authored five books on different fields of computer science. His current research interests include requirement engineering, cryptography, software reliability, wireless network security, information retrieval, soft computing, adaptive multimodal retrieval, E-learning and databases.


Dr. Namrata Agrawal is working as a Professor at National Institute of Financial Management (NIFM), an Institute of the Ministry of Finance, Government of India. She has formerly been a member of the MMNIT faculty at Allahabad. She has more than 25 years of teaching, research and consultancy experience. She has published more than 25 papers in national and international journals. She has presented 40 papers at national and international conferences andreceived the Best Paper Award at an international conference organized by the University of Maryland (ES), USA. She has also authored many best-selling books.


Dr. Dharmender Saini is working as the Principal and a Professor at the Department of Computer Science and Engineering at Bharati Vidyapeeth’s College of Engineering (BVCOE), New Delhi. He has 8 years of industry experience in the field of patent research and 8 years of academic experience. He is also a registered Indian patent agent, principal investigator with DESIDOC, DRDO, and in a data mining project and a consultant in the field of patent research.

Bibliographic Information

  • Book Title: Cyber Security

  • Book Subtitle: Proceedings of CSI 2015

  • Editors: M. U. Bokhari, Namrata Agrawal, Dharmendra Saini

  • Series Title: Advances in Intelligent Systems and Computing

  • DOI: https://doi.org/10.1007/978-981-10-8536-9

  • Publisher: Springer Singapore

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer Nature Singapore Pte Ltd. 2018

  • Softcover ISBN: 978-981-10-8535-2Published: 28 April 2018

  • eBook ISBN: 978-981-10-8536-9Published: 27 April 2018

  • Series ISSN: 2194-5357

  • Series E-ISSN: 2194-5365

  • Edition Number: 1

  • Number of Pages: XXIII, 505

  • Number of Illustrations: 74 b/w illustrations, 117 illustrations in colour

  • Topics: Systems and Data Security, Cybercrime, Coding and Information Theory

Buy it now

Buying options

Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access