on id="u2a83828e-0408-549d-8866-b04c44c89d27">
Table of Contents
1 Cover
5 Preface
7 1 Securing Cloud-Based Enterprise Applications and Its Data 1.1 Introduction 1.2 Background and Related Works 1.3 System Design and Architecture 1.4 Methodology 1.5 Performance Analysis 1.6 Future Research Direction 1.7 Conclusion References
8 2 High-Performance Computing-Based Scalable “Cloud Forensics-as-a-Service” Readiness Framework Factors—A Review 2.1 Introduction 2.2 Aim of the Study 2.3 Motivation for the Study 2.4 Literature Review 2.5 Research Methodology 2.6 Testing Environment Plan 2.7 Testing 2.8 Recommendations 2.9 Limitations of Present Study 2.10 Conclusions 2.11 Scope for the Future Work Acknowledgements References
9 3 Malware Identification, Analysis and Similarity 3.1 Introduction 3.2 Background and Related Works 3.3 Proposed System Design Architecture 3.4 Methodology 3.5 Performance Analysis 3.6 Future Research Direction 3.7 Conclusion References
10 4 Robust Fraud Detection Mechanism 4.1 Introduction 4.2 Related Work 4.3 Conclusion References
11 5 Blockchain-Based Identity Management Systems 5.1 Introduction 5.2 Preliminaries 5.3 Blockchain-Based Identity Management System 5.4 Discussion 5.5 Conclusion 5.6 Future Scope References
12 6 Insights Into Deep Steganography: A Study of Steganography Automation and Trends 6.1 Introduction 6.2 Convolution Network Learning 6.3 Recurrent Neural Networks 6.4 Long Short-Term Memory Networks 6.5 Back Propagation in Neural Networks 6.6 Literature Survey on Neural Networks in Steganography 6.7 Optimization Algorithms in Neural Networks 6.8 Conclusion References
13 7 Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System 7.1 Introduction 7.2 Problem Formulation 7.3 Proposed Mechanism 7.4 Experimental Results 7.5 Future Scope 7.6 Conclusion References
14 8 Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission 8.1 Introduction