8 Chapter 9Figure 9.1 Face.Figure 9.2 Hand geometry.Figure 9.3 Fingerprint.Figure 9.4 Voice detection.Figure 9.5 Iris.Figure 9.6 Keystrokes.Figure 9.7 (a), (b) Forms of linking biometric framework with cryptanalysis.
9 Chapter 10Figure 10.1 Architecture of Hadoop.Figure 10.2 Types of Homomorphic Encryption.
10 Chapter 12Figure 12.1 Architecture of WSN.Figure 12.2 Different parameters for security of information collection.Figure 12.3 Various standards for attack detection.
11 Chapter 14Figure 14.1 Cybercrime evolution.Figure 14.2 MITM attack.Figure 14.3 Steps of Phishing attack.Figure 14.4 A sample email.Figure 14.5 Session hijacking levels.Figure 14.6 A sample session hijacking.Figure 14.7 Steps of XSS attack.Figure 14.8 SQL injection interpretation.Figure 14.9 A sample DOS attack.Figure 14.10 Differentiation between dark, deep & surface web.Figure 14.11 Tor browser functionality.
1 Cover
2 Table of Contents
3 Title Page
4 Copyright
5 Preface
6 Begin Reading
7 Index
8 End User License Agreement
1 v
2 ii
3 iii
4 iv
5 xv
6 xvi
7 xvii
8 xviii
9 xix
10 1
11 2
12 3
13 4
14 5
15 6
16 7
17 8
18 9
19 10
20 11
21 12
22 13
23 14
24 15
25 16
26 17
27 18
28 19
29 20
30 21
31 22
32 23
33 24
34 25
35 26
36 27
37 28
38 29
39 30
40 31
41 32
42 33
43 34
44 35
45 36
46 37
47 38
48 39
49 40
50 41
51 42
52 43
53 44
54 45
55 46
56 47
57 48
58 49
59 50
60 51
61 52
62 53
63 54
64 55
65 57
66 58
67 59
68 60
69 61
70 62
71 63
72 64
73 65
74 66
75 67
76 68
77 69
78 70
79 71
80 72
81 73
82 74
83 75
84 76
85 77
86 78
87 79
88 80
89 81
90 82
91 83
92 84
93 85
94 86
95 87
96 88
97 89
98 90
99 91
100 92
101 93
102 94
103 95
104 96
105 97
106 98
107 99
108 100
109 101
110 102
111 103
112 104
113 105
114 106
115 107
116 108
117 109
118 110
119 111
120 112
121 113
122 114
123 115
124 116
125 117
126 118
127 119
128 120
129 121
130 122
131 123
132 124
133 125
134 126
135 127
136 128
137 129
138 130
139 131
140 132
141 133
142 134
143 135
144 136
145 137
146 138
147 139
148 140
149 141
150 142
151 143
152 144
153 145
154 146
155 147
156 148
157 149
158 150
159 151
160 152
161 153
162 154
163 155
164 156
165 157
166 158
167 159
168 160
169 161
170 162
171 163
172 164
173 165
174 166
175 167
176 168
177 169
178 170
179 171
180 172
181 173
182 174
183 175
184 176
185 177
186 178
187 179
188 181
189 182
190 183
191 184
192 185
193 186
194 187
195 188
196 189
197 190
198 191
199 192
200 193
201 194
202 195
203 196
204 197
205 198
206 199
207 200
208 201
209 202
210 203
211 204
212 205
213 206
214 207
215 208
216 209
217 210
218 211
219 212
220 213
221 214
222 215
223 216
224 217
225 218
226 219
227 220
228 221
229 222
230 223
231 224
232 225
233 226
234 227
235 228
236 229
237 230
238 231
239 232
240 233
241 234
242 235
243 236
244 237
245 238
246 239
247 240
248 241
249 242
250 243
251 244
252 245
253 246
254 247
255 248
256 249
257 250
258 251
259 252
260 253
261 254
262 255
263 256
264 257
265 258
266 259
267 260
268 261
269 262
270 263
271 264
272 265
273 266
274 267
275 268
276 269
277 270
278 271
279 272
280 273
281 274
282 275
283 276
284 277
285 278
286 279
287 280
288 281
289 282
290 283
291 284
292 285
293 286
294 287
295 288
296 289
297 291
298 292
299 293
300 294
301 295
302 296
303 297
304 298
305 299
306 300
307 301
308 302
309 303
310 304
311 305
312 306
313 307
314 308
315 309
316 310
317 311
318 312
319 313
320 314
321 315
322 316
323 317
324 318
325 319
326 321
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Publishers at Scrivener
Martin Scrivener ( martin@scrivenerpublishing.com)
Phillip Carmical ( pcarmical@scrivenerpublishing.com)
Intelligent Data Analytics for Terror Threat Prediction
Architectures, Methodologies, Techniques and Applications
Edited by
Subhendu Kumar Pani
Sanjay Kumar Singh
Lalit Garg
Ram Bilas Pachori
Xiaobo Zhang
This edition first published 2021 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2021 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise,except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at www.wiley.com/go/permissions.
Wiley Global Headquarters
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchant-ability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Читать дальше