|
Showing 1 - 15 of
15 matches in All Departments
This handbook introduces the basic principles and fundamentals of
cyber security towards establishing an understanding of how to
protect computers from hackers and adversaries. The highly
informative subject matter of this handbook, includes various
concepts, models, and terminologies along with examples and
illustrations to demonstrate substantial technical details of the
field. It motivates the readers to exercise better protection and
defense mechanisms to deal with attackers and mitigate the
situation. This handbook also outlines some of the exciting areas
of future research where the existing approaches can be
implemented. Exponential increase in the use of computers as a
means of storing and retrieving security-intensive information,
requires placement of adequate security measures to safeguard the
entire computing and communication scenario. With the advent of
Internet and its underlying technologies, information security
aspects are becoming a prime concern towards protecting the
networks and the cyber ecosystem from variety of threats, which is
illustrated in this handbook. This handbook primarily targets
professionals in security, privacy and trust to use and improve the
reliability of businesses in a distributed manner, as well as
computer scientists and software developers, who are seeking to
carry out research and develop software in information and cyber
security. Researchers and advanced-level students in computer
science will also benefit from this reference.
Security, privacy, and trust in the Internet of Things (IoT) and
CPS (Cyber-Physical Systems) are different from conventional
security as concerns revolve around the collection and aggregation
of data or transmission of data over the network. Analysis of
cyber-attack vectors and the provision of appropriate mitigation
techniques are essential research areas for these systems. Adoption
of best practices and maintaining a balance between ease of use and
security are, again, crucial for the effective performance of these
systems. Recent Advances in Security, Privacy and Trust for
Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses
and presents techniques and methodologies, as well as a wide range
of examples and illustrations, to effectively show the principles,
algorithms, challenges, and applications of security, privacy, and
trust for IoT and CPS. Book features: Introduces new directions for
research, development, and engineering security, privacy, and trust
of IoT and CPS Includes a wealth of examples and illustrations to
effectively demonstrate the principles, algorithms, challenges, and
applications Covers most of the important security aspects and
current trends not present in other reference books This book will
also serve as an excellent reference in security, privacy, and
trust of IoT and CPS for professionals in this fast-evolving and
critical field. The chapters present high-quality contributions
from researchers, academics, and practitioners from various
national and international organizations and universities.
Security, privacy, and trust in the Internet of Things (IoT) and
CPS (Cyber-Physical Systems) are different from conventional
security as concerns revolve around the collection and aggregation
of data or transmission of data over the network. Analysis of
cyber-attack vectors and the provision of appropriate mitigation
techniques are essential research areas for these systems. Adoption
of best practices and maintaining a balance between ease of use and
security are, again, crucial for the effective performance of these
systems. Recent Advances in Security, Privacy and Trust for
Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses
and presents techniques and methodologies, as well as a wide range
of examples and illustrations, to effectively show the principles,
algorithms, challenges, and applications of security, privacy, and
trust for IoT and CPS. Book features: Introduces new directions for
research, development, and engineering security, privacy, and trust
of IoT and CPS Includes a wealth of examples and illustrations to
effectively demonstrate the principles, algorithms, challenges, and
applications Covers most of the important security aspects and
current trends not present in other reference books This book will
also serve as an excellent reference in security, privacy, and
trust of IoT and CPS for professionals in this fast-evolving and
critical field. The chapters present high-quality contributions
from researchers, academics, and practitioners from various
national and international organizations and universities.
A comprehensive text on both current and emerging areas of
cognitive vehicular networks, this book focuses on a new class of
mobile ad hoc networks. It uses a pedagogical approach utilizing
cognitive aspects applied to vehicular environments and comprises
contributions from well-known and high profile researchers in their
respective specialties. The book provides significant technical and
practical insights on different perspectives, starting from a basic
background on cognitive radio, interrelated technologies,
application to vehicular networks, technical challenges, and future
trends.
This book features selected high-quality research papers presented
at the International Conference on Machine Intelligence and Signal
Processing (MISP 2019), held at the Indian Institute of Technology,
Allahabad, India, on September 7-10, 2019. The book covers the
latest advances in the fields of machine learning, big data
analytics, signal processing, computational learning theory, and
their real-time applications. The topics covered include support
vector machines (SVM) and variants like least-squares SVM (LS-SVM)
and twin SVM (TWSVM), extreme learning machine (ELM), artificial
neural network (ANN), and other areas in machine learning. Further,
it discusses the real-time challenges involved in processing big
data and adapting the algorithms dynamically to improve the
computational efficiency. Lastly, it describes recent developments
in processing signals, for instance, signals generated from IoT
devices, smart systems, speech, and videos and addresses biomedical
signal processing: electrocardiogram (ECG) and electroencephalogram
(EEG).
This handbook introduces the basic principles and fundamentals of
cyber security towards establishing an understanding of how to
protect computers from hackers and adversaries. The highly
informative subject matter of this handbook, includes various
concepts, models, and terminologies along with examples and
illustrations to demonstrate substantial technical details of the
field. It motivates the readers to exercise better protection and
defense mechanisms to deal with attackers and mitigate the
situation. This handbook also outlines some of the exciting areas
of future research where the existing approaches can be
implemented. Exponential increase in the use of computers as a
means of storing and retrieving security-intensive information,
requires placement of adequate security measures to safeguard the
entire computing and communication scenario. With the advent of
Internet and its underlying technologies, information security
aspects are becoming a prime concern towards protecting the
networks and the cyber ecosystem from variety of threats, which is
illustrated in this handbook. This handbook primarily targets
professionals in security, privacy and trust to use and improve the
reliability of businesses in a distributed manner, as well as
computer scientists and software developers, who are seeking to
carry out research and develop software in information and cyber
security. Researchers and advanced-level students in computer
science will also benefit from this reference.
Scalable parallel systems or, more generally, distributed memory systems offer a challenging model of computing and pose fascinating problems regarding compiler optimization, ranging from language design to run time systems. Research in this area is foundational to many challenges from memory hierarchy optimizations to communication optimization.This unique, handbook-like monograph assesses the state of the art in the area in a systematic and comprehensive way. The 21 coherent chapters by leading researchers provide complete and competent coverage of all relevant aspects of compiler optimization for scalable parallel systems. The book is divided into five parts on languages, analysis, communication optimizations, code generation, and run time systems. This book will serve as a landmark source for education, information, and reference to students, practitioners, professionals, and researchers interested in updating their knowledge about or active in parallel computing.
Today, cloud computing, big data, and the internet of things (IoT)
are becoming indubitable parts of modern information and
communication systems. They cover not only information and
communication technology but also all types of systems in society
including within the realms of business, finance, industry,
manufacturing, and management. Therefore, it is critical to remain
up-to-date on the latest advancements and applications, as well as
current issues and challenges. The Handbook of Research on Cloud
Computing and Big Data Applications in IoT is a pivotal reference
source that provides relevant theoretical frameworks and the latest
empirical research findings on principles, challenges, and
applications of cloud computing, big data, and IoT. While
highlighting topics such as fog computing, language interaction,
and scheduling algorithms, this publication is ideally designed for
software developers, computer engineers, scientists, professionals,
academicians, researchers, and students.
Internet usage has become a facet of everyday life, especially as
more technological advances have made it easier to connect to the
web from virtually anywhere in the developed world. However, with
this increased usage comes heightened threats to security within
digital environments. The Handbook of Research on Modern
Cryptographic Solutions for Computer and Cyber Security identifies
emergent research and techniques being utilized in the field of
cryptology and cyber threat prevention. Featuring theoretical
perspectives, best practices, and future research directions, this
handbook of research is a vital resource for professionals,
researchers, faculty members, scientists, graduate students,
scholars, and software developers interested in threat
identification and prevention.
This book covers selected high-quality research papers presented in
the International Conference on Cyber Security, Privacy and
Networking (ICSPN 2021), organized during 17-19 September 2021 in
India in Online mode. The objectives of ICSPN 2021 is to provide a
premier international platform for deliberations on strategies,
recent trends, innovative approaches, discussions and presentations
on the most recent cyber security, privacy and networking
challenges and developments from the perspective of providing
security awareness and its best practices for the real world.
Moreover, the motivation to organize this conference is to promote
research by sharing innovative ideas among all levels of the
scientific community, and to provide opportunities to develop
creative solutions to various security, privacy and networking
problems.
This book gives readers an in-depth analysis of the fundamentals
behind designing on-demand medium access control (MAC) protocols
for multihop wireless networks, esp. with nodes having multiple
antenna technologies. This is the first attempt towards designing
and analyzing on-demand, also known as contention-based, MAC
protocols for multiple beam smart antennas (MBSA). The book begins
with a general introduction of the state-of-art problems and
solutions that then forms the basis of this book. The book then
introduces mathematical models to analyze MBSA and derive basic MAC
fundamentals. The readers are then exposed to step-by-step MAC
design for MBSA in wireless ad hoc networks. Once the basic design
is completed, advanced concepts such as wireless mesh network
architecture, Quality of Service (QoS), interoperability with
existing IEEE802.11 standards and co-existence with other antenna
technologies, viz., omnidirectional and directional, are
introduced. Finally, the book ends with introducing link layer
reliable and energy-efficient communication mechanisms for wireless
sensor networks.
"Spectrum Selection, Sensing, and Sharing in Cognitive Radio
Networks" introduces the readers to a comprehensive idea about the
evolution and functionality of Cognitive Radio from a network
perspective. The book covers an efficient modeling technique of
spectrum occupancy patterns of primary users in licensed bands,
substantiating the results based on real-time experiments performed
in Boston, MA, USA. The next chapter introduces a new idea for
cognitive radio termed as "Spectrum Selection," a concept of
preferable selection of spectrum for further spectrum sensing. A
separate chapter on application of Hidden Markov Models is
discussed for efficient spectrum sensing techniques. Additionally,
Game theoretic approaches are illustrated with examples in one
chapter for spectrum sharing and coexistence of secondary and
primary users in licensed bands. The concept of NC-OFDMA is also
introduced as an option for efficient spectrum allocation in
coexistence of secondary networks. Finally, the book ends with an
invaluable concept on cross-layer architecture for future software
defined radio based cognitive radio that are critical to the
successful development of commercial products.
Broadband Last Mile: Access Technologies for Multimedia
Communications provides in-depth treatments of access technologies
and the applications that rely upon them or support them. It
examines innovations and enhancements along multiple dimensions in
access, with the overarching goal of ensuring that the last mile is
not the weak link in the broadband chain. Written by experts from
the academic and commercial segments of the field, the book's
self-contained sections address topics related to the disciplines
of communications, networking, computing, and signal processing.
The core of this treatment contains contemporary reviews of
broadband pipes in the classes of copper, cable, fiber, wireless,
and satellite. It emphasizes the coexistence of these classes
within a network, the importance of optical communications for
unprecedented bandwidth, and the flexibility and mobility provided
by wireless. The book also includes perspective on the increasingly
important topic of network management, providing insights that are
true regardless of the nature of the pipe. The text concludes with
a discussion of newly emerging applications and broadband services.
This book offers an all-in-one treatment of the physical pipes and
network architectures that make rich and increasingly personalized
applications possible. It serves as a valuable resource for
researchers and practitioners working in the increasingly pervasive
field of broadband.
A comprehensive text on both current and emerging areas of
cognitive vehicular networks, this book focuses on a new class of
mobile ad hoc networks. It uses a pedagogical approach utilizing
cognitive aspects applied to vehicular environments and comprises
contributions from well-known and high profile researchers in their
respective specialties. The book provides significant technical and
practical insights on different perspectives, starting from a basic
background on cognitive radio, interrelated technologies,
application to vehicular networks, technical challenges, and future
trends.
|
|