Advertisement

Proceedings of International Ethical Hacking Conference 2018

eHaCON 2018, Kolkata, India

  • Mohuya Chakraborty
  • Satyajit Chakrabarti
  • Valentina Emilia Balas
  • J. K. Mandal
Conference proceedings

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 811)

Table of contents

  1. Front Matter
    Pages i-xxvi
  2. Keynote Talk

  3. Session 1A: Ethical Hacking and Cloud Computing

    1. Front Matter
      Pages 13-13
    2. Parthajit Dholey, Anup Kumar Shaw
      Pages 25-35
    3. Arindam Dan, Sumit Gupta, Shubham Rakshit, Soumadip Banerjee
      Pages 37-46
    4. Asmita Roy, Sadip Midya, Debojyoti Hazra, Koushik Majumder, Santanu Phadikar
      Pages 47-57
  4. Session 1B: Cryptography

    1. Front Matter
      Pages 89-89
    2. Shekhar Sonthalia, Trideep Mandal, Mohuya Chakraborty
      Pages 91-102
    3. Animesh Kairi, Suruchi Gagan, Tania Bera, Mohuya Chakraborty
      Pages 103-114
    4. Debalina Ghosh, Arup Kumar Chattopadhyay, Amitava Nag
      Pages 115-124
    5. Tapan Kumar Hazra, Kishlay Raj, M. Sumanth Kumar, Soummyo Priyo Chattopadhyay, Ajoy Kumar Chakraborty
      Pages 125-138
    6. Diptasree Debnath, Emlon Ghosh, Barnali Gupta Banik
      Pages 151-161
  5. Session 2A: Modeling and Simulation

    1. Front Matter
      Pages 163-163
    2. Rheya Chakraborty, Arup Kumar Chattopadhyay, Animesh Kairi, Mohuya Chakraborty
      Pages 165-176
    3. S. Roy Chatterjee, J. Chowdhury, M. Chakraborty
      Pages 189-198
    4. Ajanta Dasgupta, Avijit Bose, Shamik Guha, Sourup Nag, Subham Mukherjee, Sumalya Saha
      Pages 199-206
  6. Session 2B: Network Security

    1. Front Matter
      Pages 207-207
    2. Rupayan Das, Moutushi Singh, Koushik Majumder
      Pages 209-222
    3. Sanjoy Roy, Suparna Biswas
      Pages 223-232
    4. S. Roy Chatterjee, S. Mukherjee, J. Chowdhury, M. Chakraborty
      Pages 233-243
  7. Session 2C: Artificial Intelligence

    1. Front Matter
      Pages 245-245
    2. Sauvik Bal, Supriyo Mahanta, Lopa Mandal, Ranjan Parekh
      Pages 247-259
    3. Nitesh Kumar, Souvik Mitra, Madhurima Bhattacharjee, Lopa Mandal
      Pages 261-272
    4. Bipulan Gain, Sudhindu Bikash Mandal, Amlan Chakrabarti, Subhansu Bandyopadhyay
      Pages 273-287
    5. H. P. Ambulgekar, Manjiri Kishor Pathak, M. B. Kokare
      Pages 289-300
  8. Session 3A: Artificial Intelligence

    1. Front Matter
      Pages 301-301
    2. Suseta Datta, Sankhadeep Chatterjee
      Pages 317-329
    3. B. Venkata Kranthi, Borra Surekha
      Pages 331-347
    4. Chayan Kumar Kayal, Sougato Bagchi, Debraj Dhar, Tirtha Maitra, Sankhadeep Chatterjee
      Pages 349-358
    5. Sourav Saha, Sudipta Saha, Suhrid Krishna Chatterjee, Priya Ranjan Sinha Mahapatra
      Pages 369-380
  9. Session 3B: Internet of Things

    1. Front Matter
      Pages 381-381
    2. Arup Kumar Chattopadhyay, Amitava Nag, Debalina Ghosh, Koustav Chanda
      Pages 383-393
    3. Ajanta Dasgupta, Ayush Daruka, Abhiti Pandey, Avijit Bose, Subham Mukherjee, Sumalya Saha
      Pages 395-403
    4. Shubham Saurav, Debashis Das Chakladar, Pragnyaa Shaw, Sanjay Chakraborty, Animesh Kairi
      Pages 419-428
  10. Session 3C: Data Analysis

    1. Front Matter
      Pages 429-429
    2. Pradip Kumar Majumder, Mohuya Chakraborty
      Pages 431-442
    3. Anand S. Tewari, Raunak Jain, Jyoti P. Singh, Asim G. Barman
      Pages 443-453
    4. Debraj Dhar, Sougato Bagchi, Chayan Kumar Kayal, Soham Mukherjee, Sankhadeep Chatterjee
      Pages 455-463
    5. Radhika Ray, Siddhartha Haldar, Subhadeep Biswas, Ruptirtha Mukherjee, Shayan Banerjee, Sankhadeep Chatterjee
      Pages 465-475
    6. Bhawna Tibrewal, Gargi Sur Chaudhury, Sanjay Chakraborty, Animesh Kairi
      Pages 477-487
    7. Sumit Chatterjee, Surojit Das, Sourav Banerjee, Utpal Biswas
      Pages 489-503

About these proceedings

Introduction

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

Keywords

eHaCON 2018 Software Engineering Social Engineering Cloud Computing Honeynets Digital Privacy Wireless Network and Security Electronic Voting Ethical Hacking Network Security Mobile Communications Security Forensics and Anti-Forensics

Editors and affiliations

  • Mohuya Chakraborty
    • 1
  • Satyajit Chakrabarti
    • 2
  • Valentina Emilia Balas
    • 3
  • J. K. Mandal
    • 4
  1. 1.Department of Information TechnologyInstitute of Engineering and ManagementKolkataIndia
  2. 2.Institute of Engineering and ManagementKolkataIndia
  3. 3.Department of Automation and Applied InformaticsAurel Vlaicu University of AradAradRomania
  4. 4.Department of Computer Science and EngineeringUniversity of KalyaniKalyaniIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-13-1544-2
  • Copyright Information Springer Nature Singapore Pte Ltd. 2019
  • Publisher Name Springer, Singapore
  • eBook Packages Engineering
  • Print ISBN 978-981-13-1543-5
  • Online ISBN 978-981-13-1544-2
  • Series Print ISSN 2194-5357
  • Series Online ISSN 2194-5365
  • Buy this book on publisher's site