|
Showing 1 - 10 of
10 matches in All Departments
Intelligent Edge Computing for Cyber Physical Applications
introduces state-of-the-art research methodologies, tools and
techniques, challenges, and solutions with further research
opportunities in the area of edge-based cyber-physical systems. The
book presents a comprehensive review of recent literature and
analysis of different techniques for building edge-based CPS. In
addition, it describes how edge-based CPS can be built to
seamlessly interact with physical machines for optimal performance,
covering various aspects of edge computing architectures for
dynamic resource provisioning, mobile edge computing, energy saving
scenarios, and different security issues. Sections feature
practical use cases of edge-computing which will help readers
understand the workings of edge-based systems in detail, taking
into account the need to present intellectual challenges while
appealing to a broad readership, including academic researchers,
practicing engineers and managers, and graduate students.
Today, cloud computing, big data, and the internet of things (IoT)
are becoming indubitable parts of modern information and
communication systems. They cover not only information and
communication technology but also all types of systems in society
including within the realms of business, finance, industry,
manufacturing, and management. Therefore, it is critical to remain
up-to-date on the latest advancements and applications, as well as
current issues and challenges. The Handbook of Research on Cloud
Computing and Big Data Applications in IoT is a pivotal reference
source that provides relevant theoretical frameworks and the latest
empirical research findings on principles, challenges, and
applications of cloud computing, big data, and IoT. While
highlighting topics such as fog computing, language interaction,
and scheduling algorithms, this publication is ideally designed for
software developers, computer engineers, scientists, professionals,
academicians, researchers, and students.
Social network usage has increased exponentially in recent years.
Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram,
not only facilitate sharing of personal data but also connect
people professionally. However, development of these platforms with
more enhanced features like HTML5, CSS, XHTML and Java Script
expose these sites to various vulnerabilities that may be the root
cause of various threats. Therefore, social networking sites have
become an attack surface for various cyber-attacks such as XSS
attack and SQL Injection. Numerous defensive techniques have been
proposed, yet with technology up-gradation current scenarios demand
for more efficient and robust solutions. Cross-Site Scripting
Attacks: Classification, Attack, and Countermeasures is a
comprehensive source which provides an overview of web-based
vulnerabilities and explores XSS attack in detail. This book
provides a detailed overview of the XSS attack; its classification,
recent incidences on various web applications, and impacts of the
XSS attack on the target victim. This book addresses the main
contributions of various researchers in XSS domain. It provides
in-depth analysis of these methods along with their comparative
study. The main focus is a novel framework which is based on
Clustering and Context based sanitization approach to protect
against XSS attack on social network. The implementation details
conclude that it is an effective technique to thwart XSS attack.
The open challenges and future research direction discussed in this
book will help further to the academic researchers and industry
specific persons in the domain of security.
With the rapid advancement in technology, myriad new threats have
emerged in online environments. The broad spectrum of these digital
risks requires new and innovative methods for protection against
cybercrimes. The Handbook of Research on Network Forensics and
Analysis Techniques is a current research publication that examines
the advancements and growth of forensic research from a relatively
obscure tradecraft to an important part of many investigations.
Featuring coverage on a broad range of topics including
cryptocurrency, hand-based biometrics, and cyberterrorism, this
publication is geared toward professionals, computer forensics
practitioners, engineers, researchers, and academics seeking
relevant research on the development of forensic tools.
Social network usage has increased exponentially in recent years.
Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram,
not only facilitate sharing of personal data but also connect
people professionally. However, development of these platforms with
more enhanced features like HTML5, CSS, XHTML and Java Script
expose these sites to various vulnerabilities that may be the root
cause of various threats. Therefore, social networking sites have
become an attack surface for various cyber-attacks such as XSS
attack and SQL Injection. Numerous defensive techniques have been
proposed, yet with technology up-gradation current scenarios demand
for more efficient and robust solutions. Cross-Site Scripting
Attacks: Classification, Attack, and Countermeasures is a
comprehensive source which provides an overview of web-based
vulnerabilities and explores XSS attack in detail. This book
provides a detailed overview of the XSS attack; its classification,
recent incidences on various web applications, and impacts of the
XSS attack on the target victim. This book addresses the main
contributions of various researchers in XSS domain. It provides
in-depth analysis of these methods along with their comparative
study. The main focus is a novel framework which is based on
Clustering and Context based sanitization approach to protect
against XSS attack on social network. The implementation details
conclude that it is an effective technique to thwart XSS attack.
The open challenges and future research direction discussed in this
book will help further to the academic researchers and industry
specific persons in the domain of security.
This book covers selected high-quality research papers presented in
the International Conference on Cyber Security, Privacy and
Networking (ICSPN 2022), organized during September 09-11, 2022, in
Thailand in online mode. The objective of ICSPN 2022 is to provide
a premier international platform for deliberations on strategies,
recent trends, innovative approaches, discussions and presentations
on the most recent cyber security, privacy and networking
challenges and developments from the perspective of providing
security awareness and its best practices for the real world.
Moreover, the motivation to organize this conference is to promote
research by sharing innovative ideas among all levels of the
scientific community and to provide opportunities to develop
creative solutions to various security, privacy and networking
problems.
Suddenly your Web server becomes unavailable. When you investigate,
you realize that a flood of packets is surging into your network.
You have just become one of the hundreds of thousands of victims of
a denial-of-service attack, a pervasive and growing threat to the
Internet. What do you do? Internet Denial of Service sheds light on
a complex and fascinating form of computer attack that impacts the
confidentiality, integrity, and availability of millions of
computers worldwide. It tells the network administrator, corporate
CTO, incident responder, and student how DDoS attacks are prepared
and executed, how to think about DDoS, and how to arrange computer
and network defenses. It also provides a suite of actions that can
be taken before, during, and after an attack. The authors'
extensive experience in handling denial-of-service attacks and
researching defense approaches is laid out clearly in practical,
detailed terms.
This book covers selected high-quality research papers presented in
the International Conference on Cyber Security, Privacy and
Networking (ICSPN 2021), organized during 17-19 September 2021 in
India in Online mode. The objectives of ICSPN 2021 is to provide a
premier international platform for deliberations on strategies,
recent trends, innovative approaches, discussions and presentations
on the most recent cyber security, privacy and networking
challenges and developments from the perspective of providing
security awareness and its best practices for the real world.
Moreover, the motivation to organize this conference is to promote
research by sharing innovative ideas among all levels of the
scientific community, and to provide opportunities to develop
creative solutions to various security, privacy and networking
problems.
|
|