Skip to main content
  • Conference proceedings
  • © 2021

Advances in Cyber Security

Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers

Part of the book series: Communications in Computer and Information Science (CCIS, volume 1347)

Conference series link(s): ACeS: International Conference on Advances in Cyber Security

Conference proceedings info: ACeS 2020.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (46 papers)

  1. Front Matter

    Pages i-xvii
  2. Internet of Things, Industry 4.0 and Blockchain, and Cryptology

    1. Front Matter

      Pages 1-1
    2. Proof-of-Work Difficulty Readjustment with Genetic Algorithm

      • Zi Hau Chin, Timothy Tzen Vun Yap, Ian K. T. Tan
      Pages 11-26
    3. Multi-factor Authentication for an Administrator's Devices in an IoT Environment

      • Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Aqeel A. Yaseen, Hamid Alasadi, Ahmed A. Alkadhmawee
      Pages 27-47
    4. A Labeled Transactions-Based Dataset on the Ethereum Network

      • Salam Al-E’mari, Mohammed Anbar, Yousef Sanjalawe, Selvakumar Manickam
      Pages 61-79
    5. ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network

      • Murtadha A. Alazzawi, Hasanain A. H. Al-behadili, Mohsin N. Srayyih Almalki, Aqeel Luaibi Challoob, Mahmood A. Al-shareeda
      Pages 80-94
    6. Internet of Things Security: A Survey

      • Shatha A. Baker, Ahmed S. Nori
      Pages 95-117
    7. DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector

      • Minhaz Bin Farukee, M. S. Zaman Shabit, Md. Rakibul Haque, A. H. M. Sarowar Sattar
      Pages 118-134
    8. Face-Based Graphical Authentication System Using Hybrid Images

      • Assim Sulaiman Khaled, Yvonne Hwei-Syn Kam
      Pages 135-147
    9. A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption

      • Azmi Shawkat Abdulbaqi, Salwa Mohammed Nejrs, Sawsan D. Mahmood, Ismail Yusuf Panessai
      Pages 148-166
    10. Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired

      • Yean Li Ho, Michael Teck Hong Gan, Siong Hoe Lau, Afizan Azman
      Pages 167-178
    11. Evaluating Pairing-Free Identity-Based Identification Using Curve25519

      • Jason Chia, Ji-Jian Chin, Sook-Chin Yip
      Pages 179-193
    12. Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher

      • Abdul Alif Zakaria, A. H. Azni, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud
      Pages 194-206
    13. Blockchain-Based Content Sharing and Data Repository System

      • Kean-Wah Cheng, Swee-Huay Heng
      Pages 207-224
    14. The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server

      • Ali Abdulrazzaq K., Awos Kh. Ali, Supriyanto Praptodiyono
      Pages 225-234
    15. A Novel Approach of Text Encryption Using Random Numbers and Hash Table

      • Abhilash Kumar Das, Nirmalya Kar
      Pages 235-247

Other Volumes

  1. Advances in Cyber Security

About this book

This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. 

The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news. 

Editors and Affiliations

  • National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia

    Mohammed Anbar, Selvakumar Manickam

  • Hodeidah University, Hodeidah, Yemen

    Nibras Abdullah

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access