Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • Dr. Gulshan Shrivastava is working as an Associate Professor in the Department of CSE at Galgotias University, Greate... moreedit
  • Dr. Prabhat Kumar, Dr. Vishal Bhatnagar, Dr. Manoj Kumaredit
Digital forensics and cybersecurity are critical fields in the fight against cybercrime. As technology continues to advance, new and emerging threats pose significant challenges for cybersecurity professionals and digital forensics... more
Digital forensics and cybersecurity are critical fields in the fight against cybercrime. As technology continues to advance, new and emerging threats pose significant challenges for cybersecurity professionals and digital forensics investigators. This edited book must comprehensively overview emerging threats and countermeasures in digital forensics and cybersecurity. It will feature chapters from leading experts in the field, covering topics such as advanced persistent threats (APTs), malware analysis and detection, insider threats, cyber-physical systems security, IoT and smart device security, cryptography and blockchain technologies, social engineering attacks, cloud computing security, and data privacy and protection. This edited book will be an invaluable resource for digital forensics investigators, cybersecurity professionals, students, law enforcement agencies, legal professionals, and academics interested in the latest challenges, developments, and tools in digital forensics and cybersecurity.
ABOUT THE BOOK Analytics is not only a buzzword, but a catalyst in up-scaling the business. Analytics is basically a systematic and scientific analysis of the subject area coupled with principles from computer science, mathematics and... more
ABOUT THE BOOK Analytics is not only a buzzword, but a catalyst in up-scaling the business. Analytics is basically a systematic and scientific analysis of the subject area coupled with principles from computer science, mathematics and statistics. Analytics aims at not only analyzing existing data, but can also predict and forecast; thus accelerating the business driven speed. The biggest challenge lies not only in analyzing existing data, but pre-processing or data cleaning; especially in case of big data. Sometimes, the data available at disposal may not be authentic, so catching the correct characteristics of it is quite challenging. This becomes of acute concern when data involved is bargained from social media. The humongous data present on social media is really unstructured in nature; thus corroborating it is one of the biggest challenges itself. This comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of Business Applications in Social Media and its analysis. Moreover, it will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field. This comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of Business Applications in Social Media and its analysis. Moreover, it will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field. This book will provide insights detailing every aspect of the field of Business Applications Analytics thus adding value to the knowledge enrichment of the subject matter. The editors will seek chapters that address different aspects such as sentiment analyzing with sarcasm detection, issues in data consolidation, and various challenges with dependability and trust analytics, automation of content extraction and an assortment of applications of business applications in social media analytics using machine learning, evolutionary algorithms and other techniques.
Research Interests:
Introduction Network Forensic has grown from a relatively obscure tradecraft to an important part of many investigations. Network Forensic tools are now used on a daily basis by examiners and analysts within local, state and Federal law... more
Introduction
Network Forensic has grown from a relatively obscure tradecraft to an important part of many investigations. Network Forensic tools are now used on a daily basis by examiners and analysts within local, state and Federal law enforcement; within the military and other US government organizations; and within the private “e-Discovery” industry. Developments in forensic research, tools, and process over the past decade have been very successful and many in leadership positions now rely on these tools on a regular basis frequently without realizing it. Moreover, there seems to be a widespread belief, buttressed on by portrayals in the popular media, that advanced tools and skillful practitioners can extract actionable information from practically any device that a government, private agency, or even a skillful individual might encounter. The field of computer forensic analysis is as rapidly changing as other security fields.

Objective
Network security when combined with forensic computing gives rise to a term known as network forensics which is nothing but a type of digital forensics which aims at the analysis of network traffic of a system for collection of information pertaining to the legal evidences related to various security breaches and intrusion detection. The network investigations that are performed by it utilize the dynamic information characteristic of a system which changes rapidly with time; hence it is a crucial task.

The two major tasks that are performed by it include:
• Keeping a check over anomalous traffic
• Intrusion detection

The intruder tries to steal the significant information from the communication that takes place in the network. Network forensic analysis deals with identifying all such vulnerable operation along with the legal law enforcements that will be triggered after that. Example: analyzing the chat sessions. Several tools are available for performing network forensics like Wireshark. Another category of network forensics is Wireless forensics which deals with the wireless traffic and its transmission. The use of Voice-over-IP (VoIP) technology plays a crucial role in this.

Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of network security, computer science, security engineering, cyber crime and network forensic. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.

Recommended Topics
Network Security: Attacks and Controls
Analysis of attacks, defenses, and countermeasures
Anonymity, Privacy, ID theft and Ethics
Dependability and security forensics
Denial-of-Service and botnet analysis, detection, and mitigation
NetworkMinerCLI: Automating content extraction with our command line tool
Cyber Crime Toolkit Development
Securing Wireless Sensor Networks
Web Service Security
Problem in Cyber Ethics
Mobile Ad Hoc Network Security Vulnerabilities
Cyber Crimes and Profiling System
Impact of Big Data on Security
Forensic Impacts on Social Media Platforms
Forensic Computing: Today & Tomorrow
Network Security & Forensic Analysis

Submission Procedure
Researchers and practitioners are invited to submit on or before March 30, 2017, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by April 30, 2017 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by May 30, 2017, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2017.

Important Dates

Full chapter Submission: .................................................................. May 30, 2017
Review Results to Chapter Authors: ................................................. July 30, 2017
Revised Chapter Submission from Chapter Authors: ....................... August 30, 2017
Final Acceptance Notifications to Chapter Authors: ........................ September 15, 2017
Submission of Final Chapters to Editor: ...........................................September 30, 2017

Inquiries
Gulshan Shrivastava
gulshanstv@gmail.com

Prabhat Kumar
prabhat@nitp.ac.in

B.B. Gupta
gupta.brij@gmail.com

Suman Bala
suman1005@gmail.com

Nilanjan Dey
neelanjandey@gmail.com
Research Interests:
Introduction Analytics is not only a buzzword, but a catalyst in up-scaling the business. Analytics is basically a systematic and scientific analysis of the subject area coupled with principles from computer science, mathematics and... more
Introduction
Analytics is not only a buzzword, but a catalyst in up-scaling the business. Analytics is basically a systematic and scientific analysis of the subject area coupled with principles from computer science, mathematics and statistics. Analytics aims at not only analyzing existing data, but can also predict and forecast; thus accelerating the business driven speed. The biggest challenge lies not only in analyzing existing data, but pre-processing or data cleaning; especially in case of big data. Sometimes, the data available at disposal may not be authentic, so catching the correct characteristics of it is quite challenging. This becomes of acute concern when data involved is bargained from social media. The humongous data present on social media is really unstructured in nature; thus corroborating it is one of the biggest challenges itself.

Objective
This comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of Business Applications in Social Media and its analysis. Moreover, it will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.This book will provide insights detailing every aspect of the field of Business Applications Analytics thus adding value to the knowledge enrichment of the subject matter. The editors will seek chapters that address different aspects such as sentiment analyzing with sarcasm detection, issues in data consolidation, and various challenges with dependability and trust analytics, automation of content extraction and an assortment of applications of business applications in social media analytics using machine learning, evolutionary algorithms and other techniques.

Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of Business Analytics, Big Data, Social network data, computer science, analytical engineering and forensic analysis . Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.

Recommended Topics
Social networking data analysis tools and services
Machine learning to gain novel insights on social network analysis
Evolutionary algorithms for learning the behavior analysis for business applications from social networks
Evolutionary algorithms of mining social networks for decision support in business applications
Mining and analyzing business applications social data for decision support & optimization
Optimization of dynamic processes in social networks for business applications
Social Implications of Electronic Government
Trust based Sentimental Analysis in Online Social Network
Forensic Analysis in Online Social Network-Based Web Applications
Online Trust evaluation
Business applications analytics through Social Network of Things


Submission Procedure
Researchers and practitioners are invited to submit on or before February 28, 2017, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by March15, 2017 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 30, 2017, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.
All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2018.

Important Dates
Proposal Submission Deadline: .................................................... February 28, 2017 Full chapter Submission: .................................................................. June 30, 2017 Revised Chapter Submission from Chapter Authors: ....................... August 30, 2017 Submission of Final Chapters to Editor: ........................................... September 30, 2017

Inquiries
Himani Bansal
singal.himani@gmail.com
Gulshan Shrivastava
gulshanstv@gmail.com

Propose a chapter for this book
Research Interests:
This book is primarily targeted at the Java programmers and students who want to prepare for the JAVA in B.Tech. & MCA. Since the book has a laser-sharp focus on the Syllabus objectives. Yet, it is not an exam-cram book. The chapters and... more
This book is primarily targeted at the Java programmers and students who want to prepare for the JAVA in B.Tech. & MCA. Since the book has a laser-sharp focus on the Syllabus objectives. Yet, it is not an exam-cram book. The chapters and the sections inside each chapter are presented in a logical learning sequence: every new chapter builds upon knowledge acquired in previous chapters, and there is no hopping from topic to topic. This facilitates stepwise learning and prevents confusion.
Chapter 1 & 2 presents a very basic introduction to Java programming language for absolute beginners. Hence, this book is also very useful for beginners to get up to speed quickly even if they are new to Java and computer programming. Even after the exam, you will find yourself returning to this book as a useful reference for basic Java programming.
This book can be used by the following audiences:
Ø Beginners with no prior Java experience can use this book to learn basic Java programming, B.Tech. & MCA exam, or both.
Ø Instructors teaching a first course in Java can use this book as a text book.
I HAVE MADE THIS LETTER LONGER THAN USUAL, ONLY BECAUSE I HAVE NOT HAD THE TIME TO MAKE IT SHORTER. BLAISE PASCAL Who This Book Is For This book is primarily targeted at the Java programmers and students who want to prepare for the... more
I HAVE MADE THIS LETTER LONGER THAN USUAL, ONLY BECAUSE I HAVE NOT HAD THE TIME TO MAKE IT SHORTER.

BLAISE PASCAL


Who This Book Is For

This book is primarily targeted at the Java programmers and students who want to prepare for the Java & Website Design in B.Tech. & MCA. Since the book has a laser-sharp focus on the Syllabus objectives. Yet, it is not an exam-cram book. The chapters and the sections inside each chapter are presented in a logical learning sequence: every new chapter builds upon knowledge acquired in previous chapters, and there is no hopping from topic to topic. This facilitates stepwise learning and prevents confusion.

Furthermore, Chapter 1 & 2 presents a very basic introduction to Java programming language for absolute beginners. Hence, this book is also very useful for beginners to get up to speed quickly even if they are new to Java and computer programming. Even after the exam, you will find yourself returning to this book as a useful reference for basic Java programming.

This book can be used by the following audiences:

• Beginners with no prior Java experience can use this book to learn basic Java programming, B.Tech. & MCA exam, or both.

• Instructors teaching a first course in Java & Website Design can use this book as a text book.
Research Interests:
Today, Android-based devices are most prevalent in the market because of user-friendly features. Due to this friendly features same as augmented the security issues. Through repackage app, the risk of confidential information loss is... more
Today, Android-based devices are most prevalent in the market because of user-friendly features. Due to this friendly features same as augmented the security issues. Through repackage app, the risk of confidential information loss is increasing day by day. The repackaged app is a malware app that behaves similarly as the original app. It is infected with malicious code and the user cannot identify the difference between the original app and repackage app. In this paper, the repackaged app and its activity to perform on the devices are discussed. An enhanced model is also proposed to identify malware applications, inspired by the web crawler technique. This model focuses to secure the ignorable overhead on the device and provide highly accurate repackaged version detection of a known app. The classification technique to ascertaining the app is also used.
On the eve of the occasion of INDIACom-2016 a special session on “Security, Analytics and Human Factors in IT” will be conducted by Dr. B.B. Gupta as session chairperson and Mr. Gulshan Shrivastava, as session co-chairperson. Original... more
On the eve of the occasion of INDIACom-2016 a special session on “Security, Analytics and Human Factors in IT” will be conducted by Dr. B.B. Gupta as session chairperson and Mr. Gulshan Shrivastava, as session co-chairperson. Original contributions are solicited for the special session “Security, Analytics and Human Factors in IT” on the eve of INDIACom – 2016; 10th INDIACom – 3rd 2016 International Conference on Computing for Sustainable Global Development in the heart of the India’s capital and historical city: New Delhi. The theme of session includes Security, Analytics and Human Factors in IT and fields which are relevant to this topic. Areas of Coverage (sub-themes) but not limited to: · Data warehousing and mining, · Web Analytics · Information Security · Digital Analytics · Role of R in Data Analysis · Information Trust · Information Retrieval · Semantic Web · Web Forensic Computing IT-security, Ethical and societal Challenges. For More details about the Special Session on Security, Analytics and Human Factors in IT follow the link: http://www.bvicam.ac.in/indiacom/splSessionDetails.asp?sessionRequestID=299 http://www.bvicam.ac.in/indiacom/splSessionDetails/CFP%20INDIACom-2016%20Gulshan%20Srivastava.pdf
The existing education system, which incorporates school assessments, has some flaws. Conventional teaching methods give students no immediate feedback, also make teachers to spend hours grading repetitive assignments, and aren't very... more
The existing education system, which incorporates school assessments, has some flaws. Conventional teaching methods give students no immediate feedback, also make teachers to spend hours grading repetitive assignments, and aren't very constructive in showing students how to improve in their academics, and also fail to take advantage of digital opportunities that can improve learning outcomes. In addition, since a single teacher has to manage a class of students, it gets difficult to focus on each and every student in the class. Furthermore, with the help of a management system for better learning, educational organizations can now implement administrative analytics and execute new business intelligence using big data. This data visualization aids in the evaluation of teaching, management, and study success metrics. In this paper, there is put forward a discussion on how Data Mining and Data Analytics can help make the experience of learning and teaching both, easier and accountable. There will also be discussion on how the education organization has undergone numerous challenges in terms of effective and efficient teachings, student-performance. In addition development, and inadequate data storage, processing, and analysis will also be discussed. The research implements Python programming language on big education data. In addition, the research adopted an exploratory research design to identify the complexities and requirements of big data in the education field.
Nowadays network grow explosively and crime related to the network is increasing. Network Forensics is a sub-division of digital forensics and it mainly focus on the analysis of network traffic and monitors the intrusion. Network... more
Nowadays network grow explosively and crime related to the network is increasing. Network Forensics is a sub-division of digital forensics and it mainly focus on the analysis of network traffic and monitors the intrusion. Network Forensics can focus on volatile and dynamic data but digital forensics is focus on stored and static data. Whenever intrusions are detected on network, then network forensics capture and record that activity for investigation process after the collection of intrusion activity analysis, perform on the network traffic. This paper is exhaustive survey of network forensics from 2005. In this paper, initially present the introduction about the network forensics and followed by their related work of various survey paper and then a study of various Network Forensics Analysis tools (NFATs) and their process model.
An android application requires specific permissions from the user to access the system resources and perform required functionalities. Recently, the android market has experienced exponential growth, which leads to malware applications.... more
An android application requires specific permissions from the user to access the system resources and perform required functionalities. Recently, the android market has experienced exponential growth, which leads to malware applications. These applications are purposefully developed by hackers to access private data of the users and adversely affect the application usability. A suitable tool to detect malware is urgently needed, as malware may harm the user. As both malware and clean applications require similar types of permissions, so it becomes a very challenging task to differentiate between them. A novel algorithm is proposed to identify the malware‐based applications by probing the permission patterns. The proposed method uses the k‐means algorithm to quarantine the malware application by obtaining permission clusters. An efficiency of 90% (approx.) is attained for malicious behaviour, which validates this work. This work substantiates the use of application permissions for potential applications in android malware detection.
Page 1. Gulshan Shrivastava and Dr. Vishal Bhatnagar ... Gulshan Shrivastava Department of Computer Science & Engineering, Ambedkar Institute of Technology, Geeta Colony, Delhi, India gulshanstv@gmail.com Dr. Vishal Bhatnagar... more
Page 1. Gulshan Shrivastava and Dr. Vishal Bhatnagar ... Gulshan Shrivastava Department of Computer Science & Engineering, Ambedkar Institute of Technology, Geeta Colony, Delhi, India gulshanstv@gmail.com Dr. Vishal Bhatnagar ...
This chapter gives a comprehensive knowledge of various machine learning classifiers to achieve authorship attribution (AA) on short texts, specifically tweets. The need for authorship identification is due to the increasing crime on the... more
This chapter gives a comprehensive knowledge of various machine learning classifiers to achieve authorship attribution (AA) on short texts, specifically tweets. The need for authorship identification is due to the increasing crime on the internet, which breach cyber ethics by raising the level of anonymity. AA of online messages has witnessed interest from many research communities. Many methods such as statistical and computational have been proposed by linguistics and researchers to identify an author from their writing style. Various ways of extracting and selecting features on the basis of dataset have been reviewed. The authors focused on n-grams features as they proved to be very effective in identifying the true author from a given list of known authors. The study has demonstrated that AA is achievable on the basis of selection criteria of features and methods in small texts and also proved the accuracy of analysis changes according to combination of features. The authors fou...
This chapter describes cyber forensics, also known as computer forensics, which is a subdivision of digital forensic science, relating to evidence detection in computers and digital storage media. The purpose of cyber forensics is the... more
This chapter describes cyber forensics, also known as computer forensics, which is a subdivision of digital forensic science, relating to evidence detection in computers and digital storage media. The purpose of cyber forensics is the forensically-sound investigation of digital media with the intent to: identify, preserve, recover, analyze, present facts, and opinions; concerning the digital information. Even though it is generally allied with the analysis of cyber-based crimes, computer forensics may also be used in civil proceedings. Evidence composed from cyber forensic analysis is typically subjected to similar procedures and performs as supplementary digital evidence. With these advancements, it was desired that cyber forensics be to protect users and remain citizen-centric. This chapter shows that there is additional research needed to understand the implications of cyber forensic research to improve detection of cyber crimes.
Whenever Intrusion is detected over the internet a network forensic is used to capture, record all the evidence, maintain documentation, and lastly perform analysis. It collects all the evidence and preserves them for future analysis.... more
Whenever Intrusion is detected over the internet a network forensic is used to capture, record all the evidence, maintain documentation, and lastly perform analysis. It collects all the evidence and preserves them for future analysis. Original evidences are stored in the evidence locker and analysis is performing on the duplicate copy of the data. Network forensic collect dynamic information but digital forensic collect volatile and static information. Network forensic proposed various network forensics analysis tools (NFATs), which provides network security and it detects intrusion and send alert message to their corresponding client and servers. A honeytrap tool is used to identify intruder and collect essential information from the intruder. Different framework is used to reconstruct the network trace. However, it is difficult to trace the intruder activity. In this paper, we deal with different tools and different framework that provides network security.
Today’s pricing of different services provided by different Cloud Computing Service providers like Google, Amazon, Microsoft, and IBM is translucent. Due to this, it makes consumers very mystify to choose their pricing plans provided by... more
Today’s pricing of different services provided by different Cloud Computing Service providers like Google, Amazon, Microsoft, and IBM is translucent. Due to this, it makes consumers very mystify to choose their pricing plans provided by different service providers. Providers offer bundled services like IBM offers (e.g., 4 GB RAM, 400 GB of storage and 2 CPU for 140$ per month). By offering bundled services, it prohibits many consumers to split their services among different providers. In this paper, an Effective Cost Optimization Model (ECOM) is proposed that will help consumers to compare different pricing schemes provided by the different service providers at each level of SaaS, PaaS, and IaaS. It is assumed that consumers can transit their services freely among different service providers. KeywordsEffective Cost Optimization Model, Variable Pricing Schemes, SaaS, PaaS, IaaS.
In recent years, privacy and forensic analysis concerns with smart devices have become a key research area. The smart devices provide enhanced features such as optimized display, in-house health monitoring, people tracking, driving... more
In recent years, privacy and forensic analysis concerns with smart devices have become a key research area. The smart devices provide enhanced features such as optimized display, in-house health monitoring, people tracking, driving directions, etc. Smart device forensics analysis is a classification under digital forensics that mainly deals with the analysis of digital evidence found in smart devices such as smartphones, tablets and smartwatch. There is an enormous rate of increase in threats with constantly increasing releases of smart devices and hasty development in innovative technologies. Digital forensics analysis procedure to acquire and analyze digital evidence originated in a smart device based on file systems, logical memory storage and operating system architectures. This special issue of the International Journal of Digital Crime and Forensics (IJDCF) contains five papers, which cover a range of aspects of security, privacy and forensic analysis system for smart devices,...
Digital signal watermarking is an indiscernible and safe transmission of freehold data through host signal that includes immersing into and extrication from the actual host. Some algorithms have been investigated for the strong and secure... more
Digital signal watermarking is an indiscernible and safe transmission of freehold data through host signal that includes immersing into and extrication from the actual host. Some algorithms have been investigated for the strong and secure embedding and extraction of watermarks within the host audio files but they do not yet yield good results in compression and re-sampling. In this chapter, an excellent method is suggested for the compressed wave files that uses random carrier to immerse the watermark in the sequence of an audio signal. The watermark is embedded lucently in audio stream after adaptive differential pulse code modulation (ADPCM) before quantization. The proposed scheme has been implemented and its parameters are compared with the finest auditory watermarking method known. A tool has been used to measure the parameters to produce the results and tabular values. The larger PSNR and smaller BER prove that the suggested scheme is robust.
A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency.... more
A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency. Essentially, cryptocurrencies are limited entries in a database that no one can change unless specific conditions are fulfilled. Here, in this chapter, the authors demystify Ethereum cryptocurrency. Initially, they introduce the said topic. While explaining, they follow a layered approach and explain each layer that is contributing in transactions. Eventually, they show the challenges for Ethereum cryptocurrency.
In Android, the inter-communication structure is governed by a late runtime binding message called Intent. Intents are having rich features which can detect the true nature of malware when compared to another known trait such as... more
In Android, the inter-communication structure is governed by a late runtime binding message called Intent. Intents are having rich features which can detect the true nature of malware when compared to another known trait such as permissions. In this work, a framework called SensDroid is formulated that evaluates the efficiency of android intents and permissions as a differentiating trait to spot malicious apps through sensitive analysis technique. Efficiency escalation has been achieved by integrating these traits with other well-known malware detection attributes. The proposed work also uses sufficient number of samples collected from official and third-party Android app market. Multiple parameters are evaluated and compared with the existing techniques. Successful categorization of clean and malware app with high identification rate has been achieved. As a background discussion, we also give a comprehensive review of ancient android application analysis techniques, risk identification techniques, and intent analysis techniques for contemporary malicious activity.
User authentication is an indispensable part of a secure system. The traditional authentication methods have been proved to be vulnerable to different types of security attacks. Artificial intelligence is being applied to crack textual... more
User authentication is an indispensable part of a secure system. The traditional authentication methods have been proved to be vulnerable to different types of security attacks. Artificial intelligence is being applied to crack textual passwords and even CAPTCHAs are being dismantled within few attempts. The use of graphical password as an alternate to the textual passwords for user authentication can be an efficient strategy. However, they have been proved to be susceptible to shoulder surfing like attacks. Advanced authentication systems such as biometrics are secure but require additional infrastructure for efficient implementation. This paper proposes a novel pattern-based multi-factor authentication scheme that uses a combination of text and images resulting for identifying the legitimate users. The proposed system has been mathematically analyzed and has been found to provide much larger password space as compared to simple text based passwords. This renders the proposed syste...
Cyber Security is generally used as substitute with the terms Information Security and Computer Security. This work involves an introduction to the Cyber Security and history of Cyber Security is also discussed. This also includes Cyber... more
Cyber Security is generally used as substitute with the terms Information Security and Computer Security. This work involves an introduction to the Cyber Security and history of Cyber Security is also discussed. This also includes Cyber Security that goes beyond the limits of the traditional information security to involve not only the security of information tools but also the other assets, involving the person's own confidential information. In computer security or information security, relation to the human is basically to relate their duty(s) in the security process. In Cyber security, the factor has an added dimension, referring humans as the targets for the cyber-attacks or even becoming the part of the cyber-attack unknowingly. This also involves the details about the cybercriminals and cyber risks going ahead with the classification of the Cybercrimes which is against individual, property, organisation and society. Impacts of security breaches are also discussed. Counter...
Universally, the security and forensic workforce keeps up tab through newest technology of attack tools and modus operandi adopted by attackers. There is a plethora of free tools available, but they aid in enforcing the security... more
Universally, the security and forensic workforce keeps up tab through newest technology of attack tools and modus operandi adopted by attackers. There is a plethora of free tools available, but they aid in enforcing the security mechanisms and analysing the attack traffic only to a certain measure. With every passing day, size of internet manifolds and so does the kind and nature of attacks. Thus, it has become difficult to analyse crime that is related with computer, as it is multiplying as fast as the web of internet itself. Digital forensic investigation is the systematic restitution of evidences/proofs collected as an outcome of exploration of concrete happenings based on digital data. After evaluating all the historical approaches used in the existing models, their pros and cons are elicited and an Encapsulated Approach of Forensic (EAF) model (proposed earlier) is extended, which engulfs all the phases of digital investigation in detail. It gives an orderly, organised and scrupulous step-by-step procedure, from identification of facts and evidences to presentation of results by the investigator in front of investigating organisation.
Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer... more
Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer volume of packets sent from distributed locations in a coordinated manner or graceful degradation of network performance by sending attack traffic at low rate. In this paper, linear prediction model, which is a commonly used statistical modeling technique for financial time series, is proposed as a new technique for detecting flooding DDoS attacks. Linear prediction model is a fast and effective method to detect variety of DDoS flooding attacks. Entropy is used as parameter to detect DDoS attacks. ns-2 network simulator is used to generate data set comprises of network trace data. The abnormal traffic is generated with different attack rates starting from 10Mbps to 100Mbps. For each time slot, entropy of incoming packets is calculated. We see that time...
Research Interests:
In this paper, we want to review the current DoS and DDoS detection and defense mechanism. Furthermore, we want to introduce the benefit of using IPv.6 in order to overcome the limitation of current detection and defense mechanisms... more
In this paper, we want to review the current DoS and DDoS detection and defense mechanism. Furthermore, we want to introduce the benefit of using IPv.6 in order to overcome the limitation of current detection and defense mechanisms against DoS and DDoS Attack.
Digital forensic investigation is the methodical restoration of evidences collected as a consequence of exploration of concrete happenings based on digital data. After analyzing all the historical approaches used in existing models, their... more
Digital forensic investigation is the methodical restoration of evidences collected as a consequence of exploration of concrete happenings based on digital data. After analyzing all the historical approaches used in existing models, their merits and demerits are conferred and an Encapsulated Approach of Forensic (EAF) Model is proposed; which encapsulates all the phases of digital investigation. It gives a systematic, meticulous and step-by-step procedure; from identification of facts and evidences to presentation of results by the investigator in front of investigating organization.
Abstract—Data mining technology can analyze massive data and it play very important role in many domains, if it used improperly it can also cause some new problem of information security. Thus several privacy preserving techniques for... more
Abstract—Data mining technology can analyze massive data and it play very important role in many domains, if it used improperly it can also cause some new problem of information security. Thus several privacy preserving techniques for association rule mining have ...
In this chapter, a digital decentralized cryptocurrency system where transactions are secured by cryptography and are independent of any centralized third party is discussed. The different characteristics of bitcoins and how transactions... more
In this chapter, a digital decentralized cryptocurrency system where transactions are secured by cryptography and are independent of any centralized third party is discussed. The different characteristics of bitcoins and how transactions occur between two bitcoin users along with some facts and examples are also discussed. The rapid internet development facilitates cyber-attacks to all type of online transactions and also to bitcoin network transactions. Some security issues are also discussed in the chapter along with the cyber-crimes and their punishments.
Description The focal objective of the Special Issue on " Recent Advances in Bio-Inspired Computing Paradigms for Security and Privacy of Innovative Computing " is to provide insight mechanisms while handling Innovative Computing; provide... more
Description The focal objective of the Special Issue on " Recent Advances in Bio-Inspired Computing Paradigms for Security and Privacy of Innovative Computing " is to provide insight mechanisms while handling Innovative Computing; provide conceptual understanding of machine to machine security issues, challenges and mechanisms; develop basic skills of Bio-inspired secure Innovative Computing architecture and explain the theory behind the security of Fog Computing, IoT and different cryptographic algorithms. It also provides a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns, practical challenges encountered and the solutions adopted in these fields. Today, Cloud Computing services are becoming indubitable parts of modern information and communication systems in our daily lives. Cloud Computing has proven to be an incredible technology for provisioning quickly deployed and scalable information technology (IT) solutions at reduced infrastructure costs. Cloud computing is unable to meet the requirements of low latency, location awareness, and mobility support. To solve this problem, researchers have introduced a trusted and dependable solution through Innovative Computing to put the services and resources of the cloud closer to users, which facilitates the leveraging of available services and resources in the edge networks. However, Innovative Computing services open a number of security and privacy issues and challenges that are becoming a key research area. The rapid advances in presence of information technologies, such as cloud computing, sensors, Internet of Things (IoT), have played a significant role in the smart city context. The smart city contributes to enhancing the life services and process the large amount of data stream, which in turn raise the security and privacy concerns. However, handling security and privacy challenges are essential for a smart city that leads to the organizations to realize the new computing paradigms. Recently, we have been witnessing the numerous literatures of security and privacy that includes end-to-end security, trustable data acquisition, transmission, processing, legitimate service provisioning, and privacy of personal data as well as the role of bio-inspired computing approaches in achieving system design and operations. Furthermore, the use of bio-inspired computing techniques (evolutionary computation, particle swarm optimization, ant colony optimization, etc.) for intelligent decision support has been exploited to originate effectual computing systems. The concept of applying computational intelligence (CI) approaches in Innovative Computing analysis is feasible and sound. Moreover, CI and its associated learning paradigms have played vital roles in a large number of application areas related to security and privacy in information systems. CI paradigm consists of various branches that are not limited to expert systems, artificial immune system, swarm intelligence, fuzzy system, neural network, evolutionary computing and various hybrid systems, which are combinations of two
Research Interests:
Guest Editors: Gulshan Shrivastava, National Institute of Technology Patna, India. Nhu Nguyen Gia, Duy Tan University, Vietnam. Gaurav Sharma,Université Libre de Bruxelles, Brussels, Belgium. Mohamed Salim BOUHLEL, University of Sfax,... more
Guest Editors: Gulshan Shrivastava, National Institute of Technology Patna, India. Nhu Nguyen Gia, Duy Tan University, Vietnam. Gaurav Sharma,Université Libre de Bruxelles, Brussels, Belgium. Mohamed Salim BOUHLEL, University of Sfax, Tunisia. INTRODUCTION: Internet is a net of networks used for innumerable purposes, even by public. Statistics show that the penetration of Internet has increased manifold in last decade and almost every Tom, Dick and Harry is using internet for fulfilling their different needs and purposes. Internet, which is also known as, Infobahn is used for purposes such as business (including e-commerce), government, academics and even for domestic purposes. It has become a powerful and an essential medium for exchange/transfer of files, online chat, documents sharing and accessing websites on World Wide Web. Even it is a powerful medium for entertainment; as people can play games, get information regarding their respective hobbies and connect with different people including friends using social media. E-learning has greatly replaced classroom learning mandate thus revolutionizing information sharing by adding newfangled dimensions. Web forensic analytics is the measurement, collection, analysis and reporting of internet data for purpose of understanding and optimizing web usage. It is a tool for measuring web traffic, business and market research by assessing and improving the effectiveness of a website. For instance, it helps to measure change of traffic to a website after the launch of a new advertising campaign, number of visitors on the website and number of pages viewed by the visitors. OBJECTIVE OF THE SPECIAL ISSUE: Today, websites are important communication channels that reach a massive audience. Measuring the effectiveness of these websites has become a key issue for researchers as well as practitioners. However, there is no consensus on how to define website effectiveness and which dimensions need to be used for the evaluation of these websites. This problem is more noteworthy for information driven websites like academic, medical and legal advisory websites. Main intend of this special issue to provide a premier international platform for wide range of professions including scholars, researchers, academicians and Industry people to present and discuss to bridge the gap by providing an in-depth look into analytic in web data and explaining technologies involved and their relationship to forensic procedures. This special issue covers web database with features beyond trust and privacy capabilities. This special issue will also discusses procedures for the validation, preservation, acquisition, examination, analysis, and reporting of web information and its best practices for the real world. 

CFP: SI on Advanced Research in Privacy and Forensic Analytic of Web Engineering in IJ of Information Technology and Web Engineering (IJITWE)(ESCI, Scopus (Elsevier)), Due on Dec. 25, 2017. Available from: https://www.researchgate.net/publication/319559725_CFP_SI_on_Advanced_Research_in_Privacy_and_Forensic_Analytic_of_Web_Engineering_in_IJ_of_Information_Technology_and_Web_Engineering_IJITWEESCI_Scopus_Elsevier_Due_on_Dec_25_2017 [accessed Sep 21, 2017].
Research Interests:
SPECIAL ISSUE ON Advance Research in Model Driven Security, Privacy and Forensic of Smart devices [International Journal of Information System Modeling and Design (IJISMD)] Guest Editor: 1. Gulshan Shrivastava, National Institute of... more
SPECIAL ISSUE ON Advance Research in Model Driven Security, Privacy and Forensic of Smart devices [International Journal of Information System Modeling and Design (IJISMD)] Guest Editor: 1. Gulshan Shrivastava, National Institute of Technology Patna, India. 2. Nhu Nguyen Gia, Duy Tan University, Vietnam. 3. Mohamed Salim BOUHLEL, University of Sfax, Tunisia. 4. Kavita Sharma, National Institute of Technology, Kurukshetra, India. INTRODUCTION: In recent years, privacy and forensic analysis concerns with smart devices have becoming a key research area. The smart devices provide enhanced features such as optimized display, in-house health monitoring, people tracking, driving directions, etc. Smart device forensics analysis is a classification under digital forensics that mainly deals with the analysis of digital evidence found in smart devices such as Smart phones, tablets and Smart watch. There is an enormous rate of increase in threats with constantly increasing releases of smart devices and hasty development in innovative technologies. Digital forensics analysis procedure to acquire and analyze digital evidences originated in a smart device based on file systems, logical memory storage and operating system architectures. OBJECTIVE OF THE SPECIAL ISSUE: Main intend of this special issue to provide a premier international platform for wide range of professions including scholars, researchers, academicians and Industry people to present and discuss to bridge the gap by providing an in-depth look into smart devices and explaining technologies involved and their relationship to analytic procedures. This special issue will also discusses procedures for the validation, preservation, acquisition, examination, analysis, and reporting of digital information and its best practices for the real world. 

CFP: SI on Advance Research in Model Driven Security, Privacy and Forensic of Smart devices in IJ of Information System Modeling and Design (IJISMD) (ESCI, Scopus (Elsevier)), Due on Oct. 15, 2017.. Available from: https://www.researchgate.net/publication/319558259_CFP_SI_on_Advance_Research_in_Model_Driven_Security_Privacy_and_Forensic_of_Smart_devices_in_IJ_of_Information_System_Modeling_and_Design_IJISMD_ESCI_Scopus_Elsevier_Due_on_Oct_15_2017 [accessed Sep 21, 2017].
Research Interests:
Secure Solutions for Network in Scalable Computing Security is a major issue in scalable computing. With the advancements in the Information and Communication Technologies, more and more secure solutions are the need of the day. As the... more
Secure Solutions for Network in Scalable Computing

Security is a major issue in scalable computing. With the advancements in the Information and Communication Technologies, more and more secure solutions are the need of the day. As the security is increasing, so is the increase in the number and severity of the attacks. This issue aims to address the important aspect of security in the automated world and providing secure solutions. It is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security. Novel research in all practical areas of Scalable computing lies at the core of all the complex applications. Submissions from academia, government, and industry are encouraged.

The goal of this special issue is to capture insights, new directions and approaches for achievements and visions in security in network. With this in mind, we invite authors to submit their original works in all the areas of the secure network engineering and network engineering methods, techniques, tools, applications, and experiments for scalable computing.

Topics:

Authors are invited to submit manuscripts which present original and unpublished research in all areas related with the following topics (but are not limited):

Security and Cryptography
Secure solutions for the Scalable Computing
Challenges and issues related to security in Scalable Computing
Secure Data Center Networks
Secure Solutions for Body Area Networks
Network Investigation
Security issues with big data
Security and Privacy in Communication networks for scalability
Privacy issues in Scalable Computing
Important dates:

Submission: 01 May, 2017
Author notification: 01 July, 2017
Revised papers: 15 July, 2017
Author notification: 01 August, 2017
Camera Ready papers due: 15 August, 2017
Publication: 30 September, 2017
Submission guidelines:

Original and unpublished works on any of the topics aforementioned or related are welcome. The SCPE journal has a rigorous peer-reviewing process and papers will be reviewed by at least three S.C. referees. All submitted papers must be formatted according to the journal's instructions, which can be found at:

http://www.scpe.org/index.php/scpe/about/submissions#authorGuidelines
Research Interests:

And 17 more

Description Security is a major issue in scalable computing. With the advancements in the Information and Communication Technologies, more and more secure solutions are the need of the day. As the security is increasing, so is the... more
Description Security is a major issue in scalable computing. With the advancements in the Information and Communication Technologies, more and more secure solutions are the need of the day. As the security is increasing, so is the increase in the number and severity of the attacks. This issue aims to address the important aspect of security in the automated world and providing secure solutions. It is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security. Novel research in all practical areas of Scalable computing lies at the core of all the complex applications. Submissions from academia, government, and industry are encouraged. The goal of this special issue is to capture insights, new directions and approaches for achievements and visions in security in network. With this in mind, we invite authors to submit their original works in all the areas of the secure network engineering and network engineering methods, techniques, tools, applications, and experiments for scalable computing.
Research Interests:
Aim: The focal objective of the Special Session on “Security Trends in Mobile Web Analytics and IoT” is to provide insight mechanisms while handling data; provide conceptual understanding of network security issues, challenges and... more
Aim: The focal objective of the Special Session on “Security Trends in Mobile Web Analytics and IoT” is to provide insight mechanisms while handling data; provide conceptual understanding of network security issues, challenges and mechanisms; develop basic skills of secure network architecture and explain the theory behind the security of wireless networks, antennas and different cryptographic algorithms. It also provides a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns, practical challenges encountered and the solutions adopted in these fields. When sharing of information and data comes into light then the  deep analysis of used network is of utmost importance.This special session will focus on state-of-the-art research paradigms on security aspects in IoT, Web and Mobile Analytics, particularly on advances in mobile computing technologies and related areas.
Moreover, this session will spotlight on the research challenges and issues in the mobile cloud computing security. This special session is open for submission for high quality research contributions from academia and professionals. Original research papers and state of the art reviews will be accepted. We anticipate that the special session will open new entrance for further research and technology improvements in this important area.

Areas of Coverage (sub-themes)
Security and privacy of mobile cloud computing
Security of Mobile, peer-to-peer and pervasive services in clouds
Security of Mobile commerce and mobile internet of things
Social networking security and privacy concepts and applications
Social network modeling and security issues
Information revelation and privacy in online social networks
Social networking data analysis tools and services
Machine learning to gain novel insights on social network security analysis
Security of Operating system and middleware support for mobile computing
Security of Pricing and billing for mobile cloud computing services
Security and privacy in Smartphone Devices
Security and privacy in sensor networks
Security and privacy in social applications and networks
Web service security
Security of 3G/4G systems, Wi-MAX, Ad-hoc, Petrinets
Security of Mobile social networks
Near field communication services
Security of Smart cities, smart environments and smart grid
Security of Smart transportation
Security of Smart vehicular networks
Service-oriented architectures, service portability, P2P
Network virtualization and cloud-based radio access networks
Web Forensic Computing
Security IoT Data Analytics & Platforms
Session Chair(s):

Manju Khari, Ambedkar Institute of Advanced Communication Technology and
Research, Govt. Of NCT Delhi (INDIA)
E-mail: manjukhari@yahoo.co.in
Mobile: + 91-9899296110

Prabhat Kumar, National Institute of Technology, Patna (INDIA)
E-mail: prabhat@nitp.ac.in

Gulshan Shrivastava, Galgotias University, (INDIA)
E-mail: gulshanstv@gmail.com

Web link for more Details:

http://www.mictech.ac.in/SPECIAL_SESSION_IC3T_2016(4).doc

Contact Details
e-Mail: manjukhari@yahoo.co.in, gulshanstv@gmail.com
Mobile: +91-9899296110, +91-9873876394

Important Dates

Last Date of Paper Submission:      28th June, 2016

Notification of Acceptance:            28th August, 2016

Camera Ready Copy:                    28th September, 2016

Paper Submission
Please submit your paper (in word/pdf format) at Email: manjukhari@yahoo.co.in and gulshanstv@gmail.com with "Security Trends in Mobile Web Analytics and IoT" (STMWAIoT' 16) mentioned in the subject line.


Registration Details

http://ic3t.mictech.ac.in/index.php/registration

Review Process, Publication and Indexing
The convention aims at carrying out two rounds of review process. In the first round, the papers submitted by the authors will be assessed on the basis of their technical suitability, scope of work and plagiarism, to be scanned by Turnitin. The corresponding authors of qualifying submissions will be intimated for their papers to be double blind reviewed by at-least three experts on the basis of originality, novelty, clarity, completeness, relevance, significance and research contribution.
Authors are required to adhere to the Springer Policy and Procedures on Plagiarism please Click here

The shortlisted papers will be accepted for presentation and proceeding to be published by Springer. A further chosen set of selected papers will be invited for publications in special issues of reputed journals. following its due review process.
Note: A list of nearby hotels / guest houses is available on the website. The authors are requested to kindly contact the hotel and book accommodation directly.
Sensing technologies, wireless communications, and control systems are becoming ubiquitous in our daily lives, with the potential to enhance and streamline many aspects of modern society. However, this also creates new challenges in terms... more
Sensing technologies, wireless communications, and control systems are becoming ubiquitous in our daily lives, with the potential to enhance and streamline many aspects of modern society. However, this also creates new challenges in terms of ensuring trust and managing risks associated with the use of these technologies. The sheer volume of data that is being collected and shared through these systems, combined with the potential for malicious actors to exploit vulnerabilities in their design and operation, can compromise the privacy, security, and safety of individuals and organizations. In recent years, there has been a growing interest in the intersection of sensing, wireless communications, and control in the context of information, trust, and risk. This special issue aims to provide a forum for researchers to share their latest findings and insights on this important topic. The goal is to explore the challenges and opportunities in designing and implementing sensing, wireless communication, and control systems that are trustworthy, resilient, and secure. We invite original research articles that address issues related to the intersection of sensing, wireless communications, and control in the context of information, trust, and risk. Submissions may explore a wide range of topics, including but not limited to trust in sensing systems, risk assessment and management in wireless communications, control system security, privacy and information sharing, novel sensing, wireless communication, and control applications, ethical issues in the use of sensing, wireless communication, and control technologies, human factors in trust and risk perception, legal and regulatory issues, challenges and solutions for securing the Internet of Things (IoT), social and economic implications, cybersecurity threats and vulnerabilities, interference and reliability issues in wireless communication systems, and machine learning and artificial intelligence for trust and risk management. We anticipate that the thematic issue will open new entrance for further research and technology improvements in this important area.
http://www.inderscience.com/info/ingeneral/cfp.php?id=4258 Description The focal objective of the Special Issue on " Recent Advances in Bio-Inspired Computing Paradigms for Security and Privacy of Innovative Computing " is to provide... more
http://www.inderscience.com/info/ingeneral/cfp.php?id=4258

Description The focal objective of the Special Issue on " Recent Advances in Bio-Inspired Computing Paradigms for Security and Privacy of Innovative Computing " is to provide insight mechanisms while handling Innovative Computing; provide conceptual understanding of machine to machine security issues, challenges and mechanisms; develop basic skills of Bio-inspired secure Innovative Computing architecture and explain the theory behind the security of Fog Computing, IoT and different cryptographic algorithms. It also provides a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns, practical challenges encountered and the solutions adopted in these fields. Today, Cloud Computing services are becoming indubitable parts of modern information and communication systems in our daily lives. Cloud Computing has proven to be an incredible technology for provisioning quickly deployed and scalable information technology (IT) solutions at reduced infrastructure costs. Cloud computing is unable to meet the requirements of low latency, location awareness, and mobility support. To solve this problem, researchers have introduced a trusted and dependable solution through Innovative Computing to put the services and resources of the cloud closer to users, which facilitates the leveraging of available services and resources in the edge networks. However, Innovative Computing services open a number of security and privacy issues and challenges that are becoming a key research area. The rapid advances in presence of information technologies, such as cloud computing, sensors, Internet of Things (IoT), have played a significant role in the smart city context. The smart city contributes to enhancing the life services and process the large amount of data stream, which in turn raise the security and privacy concerns. However, handling security and privacy challenges are essential for a smart city that leads to the organizations to realize the new computing paradigms. Recently, we have been witnessing the numerous literatures of security and privacy that includes end-to-end security, trustable data acquisition, transmission, processing, legitimate service provisioning, and privacy of personal data as well as the role of bio-inspired computing approaches in achieving system design and operations. Furthermore, the use of bio-inspired computing techniques (evolutionary computation, particle swarm optimization, ant colony optimization, etc.) for intelligent decision support has been exploited to originate effectual computing systems. The concept of applying computational intelligence (CI) approaches in Innovative Computing analysis is feasible and sound. Moreover, CI and its associated learning paradigms have played vital roles in a large number of application areas related to security and privacy in information systems. CI paradigm consists of various branches that are not limited to expert systems, artificial immune system, swarm intelligence, fuzzy system, neural network, evolutionary computing and various hybrid systems, which are combinations of two
The focal objectives of this special issue are to provide insight mechanisms while handling innovative computing; provide conceptual understanding of machine-to-machine security issues, challenges and mechanisms; develop basic skills in... more
The focal objectives of this special issue are to provide insight mechanisms while handling innovative computing; provide conceptual understanding of machine-to-machine security issues, challenges and mechanisms; develop basic skills in bio-inspired secure innovative computing architectures; and to explain the theory behind the security of fog computing, Internet of Things and different cryptographic algorithms. The issue will also provide a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, concerns and practical challenges encountered, and the solutions adopted in these fields. Today, cloud computing services are becoming indubitable parts of modern information and communication systems in our daily lives. Cloud computing has proven to be an incredible technology for provisioning quickly deployed and scalable information technology solutions at reduced infrastructure costs. Cloud computing is unable to meet the requirements of low latency, location awareness and mobility support. To solve this problem, researchers have introduced a trusted and dependable solution through innovative computing to put the services and resources of the cloud closer to users, which facilitates the leveraging of available services and resources in the edge networks. However, innovative computing services open a number of security and privacy issues and challenges that are becoming a key research area. The rapid advances in information technologies – such as cloud computing, sensors and IoT – have played a significant role in the smart city context. The smart city contributes to enhancing life services and processes large data streams, which in turn raises security and privacy concerns. However, handling security and privacy challenges is essential for smart cities, which encourages organisations to explore new computing paradigms. Recently, we have been witnessing a lot of literature on security and privacy that includes end-to-end security, trustable data acquisition, transmission, processing, legitimate service provisioning and privacy of personal data, as well as the role of bio-inspired computing approaches in achieving system design and operations. Furthermore, the use of bio-inspired computing techniques (evolutionary computation, particle swarm optimisation, ant colony optimisation, etc.) for intelligent decision support has been exploited to originate effectual computing systems. The concept of applying computational intelligence (CI) approaches in innovative computing analysis is feasible and sound. Moreover, CI and its associated learning paradigms have played vital roles in a large number of application areas related to security and privacy in information systems. The CI paradigm consists of various branches that include but are not limited to expert systems, artificial immune systems, swarm intelligence, fuzzy systems, neural networks, evolutionary computing and various hybrid systems, which are combinations of two or more of these branches. The goal of this special issue is to present state-of-art research and developments in CI approaches for security and privacy of innovative computing and secure innovative computing services, novel attacks on innovative computing services, and novel defences for innovative computing services attacks and innovative computing security analysis. We invite researchers to contribute original research articles as well as comprehensive review articles that seek to understand CI techniques, leading to real-world innovative computing challenges and future improvements for security and privacy for fog and mobile edge computing services. We expect contributions to address the latest research, innovative ideas, challenges and bio-inspired computing solutions in security and privacy aspects of the smart city.
Research Interests:
Introduction In recent years, privacy and forensic analysis concerns with smart devices have becoming a key research area. The smart devices provide enhanced features such as optimized display, in-house health monitoring, people tracking,... more
Introduction
In recent years, privacy and forensic analysis concerns with smart devices have becoming a key research area. The smart devices provide enhanced features such as optimized display, in-house health monitoring, people tracking, driving directions, etc. Smart device forensics analysis is a classification under digital forensics that mainly deals with the analysis of digital evidence found in smart devices such as Smart phones, tablets and Smart watch. There is an enormous rate of increase in threats with constantly increasing releases of smart devices and hasty development in innovative technologies. Digital forensics analysis procedure to acquire and analyze digital evidences originated in a smart device based on file systems, logical memory storage and operating system architectures.

Objective
Main intend of this special issue to provide a premier international platform for wide range of professions including scholars, researchers, academicians and Industry people to present and discuss to bridge the gap by providing an in-depth look into smart devices and explaining technologies involved and their relationship to analytic procedures. This special issue covers smart devices with features beyond sensor and IoT capabilities. This special issue will also discusses procedures for the validation, preservation, acquisition, examination, analysis, and reporting of digital information and its best practices for the real world.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Secure converged and integrated systems for forensic computing
• Investigation modeling for Smart device data analytics & platforms
• Privacy and forensic of Smart devices in banking systems
• Privacy and forensic of Smart devices in telecommunication systems
• Privacy and forensic of Smart devices in finance systems
• Risk and reliability analysis in the Internet and enterprise Smart devices
• Privacy and forensic of Smart devices in communication systems
• Privacy and forensic of Smart devices in e-Commerce
• Analysis of big data in emergency services, energy, food chain
• Privacy analysis of Smart devices in critical infrastructure
• Privacy and forensics management of Smart devices in cloud computing
• Security and privacy analysis of Industrial control systems
• Security, privacy and forensics of big data in stock trade
• Smart device data for security analysis
• Evidence collection through Smart device data analytics
• Privacy and forensic of Web engineering in telecommunication systems

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Recent Research in Security, Privacy and Forensic Analysis System for Smart Devices on or before May 01, 2018. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Gulshan Shrivastava
Guest Editor
International Journal of Digital Crime and Forensics (IJDCF)
E-mail: gulshan.shrivastava@ieee.org
Research Interests:
We are glad to inform you that the School of Engineering & Technology, Sharda University, Greater Noida is organizing One Week International FDP on "Recent Trends in Cyber Security" through online mode from 26th June -01st July, 2021.... more
We are glad to inform you that the School of Engineering & Technology, Sharda University, Greater Noida is organizing One Week International FDP on "Recent Trends in Cyber Security" through online mode from 26th June -01st July, 2021.

You are invited to attend the same and register yourself.

Kindly register yourself at the earliest by visiting the following link: https://forms.gle/jpsutNDPE2apNdaC7
Research Interests: