This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented.Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook.This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
Les mer
1. Security Frameworks in Mobile Cloud Computing.- 2. An investigation study of Privacy Preserving in Cloud.- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study.- 4. A Novel AckIBE based Secure Cloud Data Management Framework.- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms.- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures.- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks.- 8. Preventing Security and Privacy Attacks in WBANs.- 9. Security in Underwater Wireless Sensor Networks.- 10. Security Issues in Cognitive Radio Ad Hoc Networks.- 11. Security and privacy in social networks: Data and Structural Anonymity.- 12. SOI FinFET for Computer Networks and Cyber Security Systems.- 13. Software Defined Networking: An Innovative Approach to Computer Networks.- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions.- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network.- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes.- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network.- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions.- 19. Fog Computing: Applications and Secure Data Aggregation.- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment.- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network.- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study.- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems.- 24. Investigation of Security Issues in Distributed Systems Monitoring.- 25. An analysis of Provable Security Frameworks for RFID Security.- 26. Computational Techniques for Real Time Credit Card Fraud Detection.- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective.- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction.- 29. QKD protocols security between theory and engineering implementation.- 30. Survey of Security and Privacy issues on Biometric system.- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics.- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces.- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators.- 34. Recent Trends in Document Authentication using Text Steganography.- 35. Machine Learning Based Intrusion Detection Techniques.- 36. Feature Selection using a Machine Learning to Classify a Malware.- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection.- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools.- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
Les mer
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented.Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook.This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
Les mer
Presents a comprehensive collection of up-to-date computer network and cyber security issues and analysis Provides refreshing, informative and easy to follow subject matter Includes valuable insight into security aspects, current trends and case studies/use cases
Les mer

Produktdetaljer

ISBN
9783030222796
Publisert
2021-08-26
Utgiver
Vendor
Springer Nature Switzerland AG
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Graduate, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet

Biographical note

Brij B. Gupta received his PhD degree from the Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for the Canadian Commonwealth Scholarship award by the Government of Canada. He has published more than 150 research papers (including 04 books and 18 book chapters) in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Inderscience, etc. He has visited several countries, i.e. Canada, Japan, Australia, China, Spain, Hong-Kong, Italy, Malaysia, Macau, etc. to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. In addition, he has been selected in 2017 to receive the Albert Nelson Marquis Lifetime Achievement Award’ by Marquis Who's Who in the World, USA. He also received the Sir Visvesvaraya Young Faculty Research Fellowship Award in 2017 from the Ministry of Electronics and Information Technology, Government of India. Recently, he has been awarded with ‘2018 Best Faculty Award for research activities’ and ‘2018 Best Faculty Award for Project and Laboratory Development’ from the National Institute of Technology Kurukshetra, India.

Gregorio Martínez Pérez received a Ph.D. degree in Computer Science at the University of Murcia (Spain). In 1997 he started working in Computer Service of the same University on various projects on end-user products related to security and networking, and in 2014 he was appointed as Full Professor in the same department. His scientific activity is mainly devoted to cybersecurity, privacy and 5G networking, including security considerations, management models, network slicing and communication architectures. He is also working on the design and autonomic monitoring of real-time and critical applications and systems. He is working on different national (14 in the last decade) and European IST research projects (11 in the last decade) related to these topics, being Principal Investigator in most of them. He has published more than 160 papers in national and international conference proceedings, magazines and journals. He has been guest editing more than 30 special issues in different journals and magazines in the last few years. He is member of the editorial board of 16 journals, most of them related to the topics being covered in this handbook. He has already supervised 10 PhD students, several of them recognized with honors. He is currently the Deputy Director for Knowledge Transfer of the University of Murcia.
Dharma P. Agrawal is the Ohio Board of Regents Distinguished Professor and the founding director for the Center for Distributed and Mobile Computing in the Department of Electrical Engineering and Computing Systems. He has been a faculty member at the ECE Dept., Carnegie Mellon University (on sabbatical leave), N.C. State University, Raleigh and the Wayne State University. His current research interests include applications of sensor networks in monitoring Parkinson’s disease patients and neurosis, applications of sensor networks in monitoring fitness of athletes’ personnel wellness, applications of sensor networks in monitoring firefighters physical condition in action, efficient secured communication in Sensor networks, secured group communication in Vehicular Networks, use of Femto cells in LTE technology and interference issues, heterogeneous wireless networks, and resource allocation and security in mesh networks for 4G technology. He has been the Program Chair and General Chair for numerous international conferences and meetings.He has been named as an ISI Highly Cited Researcher, is a Fellow of the IEEE, the ACM, the AAAS and the World Innovation Foundation, and a recent recipient of 2008 IEEE CS Harry Goode Award.
Deepak Gupta received his Master of Science degree from Illinois Institute of Technology, Chicago, USA, in the area of Computer Forensics and Cyber Security with a specialization in Voice Over Internet Protocol (VOIP). As an undergraduate student, he became certified on the major networking platforms, first as a CCNA (Cisco Certified Network Administrator) and then as a MCP (Microsoft Certified Professional) which would come to serve him well in his professional life. As a graduate student, Deepak continued to challenge himself by working on a number of research papers and projects related to Computer Network Security and Forensics Research, including the topics of multi-boot computer systems with change of boot loader and MP3 steganography. He also developed and furthered his interest in VOIP technology by working on and leading research projects with Bell Labs, a prominent VOIP research lab based in Chicago. Deepak also wrote research papers in this field on the topics of P2P communication and SIP protocols whichwon him the best student VOIP project award in 2007.