Cyber Security and Computer Science
Home > Computing and Information Technology > Computer security > Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings
Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings

Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings

|
     0     
5
4
3
2
1




International Edition


About the Book

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020. The 58 full papers were carefully reviewed and selected from 133 submissions. The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems; image steganography and risk analysis on web applications; machine learning in disease diagnosis and monitoring; computer vision and image processing in health care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing.

Table of Contents:
Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based On ISO/IEC-27001.- Performance Optimization of Layered SignatureBased Intrusion Detection System Using Snort.- Designing A New Hybrid Cryptographic Model RP-DMAC: Receiver Pivotal Directional MAC with Multichannel for IoT Based WSN.- Android Malware Detection by Machine Learning Apprehension and Static Feature Characterization.- Analysis of Agent-based & Agent-less Sandboxing for Dynamic Malware Analysis.- A Large Scale Investigation to Identify the Pattern of Permissions in Obfuscated Android Malwares.- A New 8-Directional Pixel Selection Technique of LSB.- An Enhancement of Kerberos Using BiometricTemplate and Steganography.- A Vulnerability Detection Framework for CMS Using Port Scanning Technique.-  A Risk Based Analysis on Linux Hosted E-Commerce.- T-way Strategy for (Sequence less Input Interaction).- Test Case Generation Inspired by Fish Swarm Searching Algorithm.- Chemical Reaction Optimization for Solving Resource Constrained Project Scheduling Problem.- A Modified Particle Swarm Optimization for Autonomous UAV Path Planning in 3D Environment.- A New Approach to Solve Quadratic Equation Using Genetic Algorithm.- Link Prediction on Networks Created from UEFA European Competitions.- Sustainable Rice Production Analysis and Forecasting Rice Yield Based on Weather Circumstances Using Data Mining Techniques for Bangladesh.- Bangladeshi Stock Price Prediction and Analysis with Potent Machine Learning Approaches.- Training Data Selection Using Ensemble Dataset Approach for Software Defect Prediction.- Prevalence of Machine Learning Techniques in Software Defect Prediction.- Software Process Improvement based on Defect Prevention using Capability and Testing Model Integration in Extreme Programming.- Predicting Fans’ FIFA World Cup Team Preference from Tweets.- Machine Learning Based Recommendation Systems for theMode of Childbirth.- EMG-based Classification of Forearm Muscles in Prehension Movements: Performance Comparison of Machine Learning Algorithms.- Prediction Model for Self-Assessed Health Status in Flood-Prone Area of Bangladesh.- Machine learning techniques for predicting surface EMG activities on upper limb muscle: A systematic review.- Retrospective Analysis of Hematological Cancer by Correlating Hematological Malignancy with Occupation, Residence, Associated Infection, Knowledge and Previous Cancer History in Relatives.- Performance Comparison of Early Breast Cancer Detection Precision Using AI and Ultra-wideband (UWB) Bio-Antennas.- Processing with Patients’ Statement: An Advanced Disease Diagnosis Technique.- Non-Invasive Diabetes Level Monitoring System using Artificial Intelligence and UWB.- An Investigation and Evaluation of N-Gram, TF-IDF and Ensemble Methods in Sentiment Classification.- Aspect Based Sentiment Analysis In Bangla Dataset Based On Aspect Term Extraction.- Development of a Tangent Based Robust Speech Feature Extraction Model.- Semantic Sentence Modeling for Learning Textual Similarity Exploiting LSTM.- A Study of fastText Word Embedding Effects in Document Classification in Bangla Language.- A Hybrid Approach Towards Two Stage Bengali Question.- Classification Utilizing Smart DataBalancing Technique.- An Empirical Framework to Identify Authorship from Bengali Literary Works.- Supervised Machine Learning for Multi-Label Classification of Bangla Articles.- Ulcer Detection in Wireless Capsule Endoscopy Using Locally Computed Features.- Human Age Estimation And Gender Classification Using Deep Conolutional Neural Network.- Diagnosis of Acute Lymphoblastic Leukemia from Microscopic Image of Peripheral Blood Smear Using Image Processing Technique.- Analysis of Software Defined Wireless Network with IP Mobility in Multiple Controllers Domain.- An SDN Based Distributed IoT Network with NFV Implementation for Smart Cities.- On the Energy Efficiency and Performance of DelayTolerant.- Conic Programming Approach to Reduce Congestion.- Sightless Helper: An Interactive Mobile Application for Blind Assistance and Safe Navigation.- IoT Based Smart Health Monitoring System for Diabetes Patients using Neural Network.- Parking Recommender System Using Q-Learning and Cloud Computing.- Advanced Artistic Style Transfer Using Deep Neural Network.- Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets.- Efficient Query Processing for Multidimensional Data Cubes.- Proposal of a Highly Birefringent Bow-Tie Photonic Crystal Fiber for Nonlinear Applications.- A Bioinformatics Analysis to Identify Hub Genes from Protein-Protein Interaction Network for Cancer and Stress.- Innovative Automation Algorithm in Micro-multinational Data-entry Industry.- Classification of Succulent Plant using Convolutional Neural Network.- Smoke Detection from Different Environmental Conditions using Faster R-CNN Approach Based on Deep Neural Network.- Convolutional Neural Networks Based Bengali Handwritten Character Recognition.- Detection and Classification of Road Damage Using R-CNN and Faster R-CNN: A Deep Learning Approach. 


Best Sellers


Product Details
  • ISBN-13: 9783030528553
  • Publisher: Springer Nature Switzerland AG
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Sub Title: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings
  • ISBN-10: 3030528553
  • Publisher Date: 30 Jul 2020
  • Height: 235 mm
  • No of Pages: 745
  • Returnable: Y
  • Width: 155 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings
Springer Nature Switzerland AG -
Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!