Read While You Wait - Get immediate ebook access, if available*, when you order a print book

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Cyber Security and Computer Science

Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings

Editors: Bhuiyan, Touhid, Rahman, Md. Mostafijur, Ali, Md. Asraf (Eds.)

Free Preview

Buy this book

eBook $109.00
price for USA in USD
  • ISBN 978-3-030-52856-0
  • Digitally watermarked, DRM-free
  • Included format: EPUB, PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $139.99
price for USA in USD
  • ISBN 978-3-030-52855-3
  • Free shipping for individuals worldwide
  • Immediate ebook access, if available*, with your print order
  • Usually dispatched within 3 to 5 business days.
About this book

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020.
The 58 full papers were carefully reviewed and selected from 133 submissions.
The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems; image steganography and risk analysis on web applications; machine learning in disease diagnosis and monitoring; computer vision and image processing in health care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing.

Table of contents (58 chapters)

Table of contents (58 chapters)
  • Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based on ISO/IEC-27001

    Pages 3-13

    Kanter-Ramirez, Christopher A. (et al.)

  • Performance Optimization of Layered Signature Based Intrusion Detection System Using Snort

    Pages 14-27

    Firoz, Noor Farjana (et al.)

  • Designing a New Hybrid Cryptographic Model

    Pages 28-42

    Selçuk, Burhan (et al.)

  • RP-DMAC: Receiver Pivotal Directional MAC with Multichannel for IoT Based WSN

    Pages 43-55

    Howlader, Arpita (et al.)

  • Android Malware Detection by Machine Learning Apprehension and Static Feature Characterization

    Pages 59-71

    Hasan, Md Rashedul (et al.)

Buy this book

eBook $109.00
price for USA in USD
  • ISBN 978-3-030-52856-0
  • Digitally watermarked, DRM-free
  • Included format: EPUB, PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $139.99
price for USA in USD
  • ISBN 978-3-030-52855-3
  • Free shipping for individuals worldwide
  • Immediate ebook access, if available*, with your print order
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Cyber Security and Computer Science
Book Subtitle
Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings
Editors
  • Touhid Bhuiyan
  • Md. Mostafijur Rahman
  • Md. Asraf Ali
Series Title
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Series Volume
325
Copyright
2020
Publisher
Springer International Publishing
Copyright Holder
ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
eBook ISBN
978-3-030-52856-0
DOI
10.1007/978-3-030-52856-0
Softcover ISBN
978-3-030-52855-3
Series ISSN
1867-8211
Edition Number
1
Number of Pages
XVII, 745
Number of Illustrations
127 b/w illustrations, 252 illustrations in colour
Topics

*immediately available upon purchase as print book shipments may be delayed due to the COVID-19 crisis. ebook access is temporary and does not include ownership of the ebook. Only valid for books with an ebook version. Springer Reference Works are not included.