|
|
Showing 1 - 25 of
46 matches in All Departments
Every day approximately three-hundred thousand to four-hundred
thousand new malware are registered, many of them being adware and
variants of previously known malware. Anti-virus companies and
researchers cannot deal with such a deluge of malware - to analyze
and build patches. The only way to scale the efforts is to build
algorithms to enable machines to analyze malware and classify and
cluster them to such a level of granularity that it will enable
humans (or machines) to gain critical insights about them and build
solutions that are specific enough to detect and thwart existing
malware and generic-enough to thwart future variants. Advances in
Malware and Data-Driven Network Security comprehensively covers
data-driven malware security with an emphasis on using statistical,
machine learning, and AI as well as the current trends in
ML/statistical approaches to detecting, clustering, and
classification of cyber-threats. Providing information on advances
in malware and data-driven network security as well as future
research directions, it is ideal for graduate students,
academicians, faculty members, scientists, software developers,
security analysts, computer engineers, programmers, IT specialists,
and researchers who are seeking to learn and carry out research in
the area of malware and data-driven network security.
The integration of new technologies is resulting in an increased
demand for security and authentication in all types of data
communications. Cybersecurity is the protection of networks and
systems from theft. Biometric technologies use unique traits of
particular parts of the body such facial recognition, iris,
fingerprints and voice to identify individuals' physical and
behavioural characteristics. Although there are many challenges
associated with extracting, storing and processing such data,
biometric and cybersecurity technologies along with artificial
intelligence (AI) are offering new approaches to verification
procedures and mitigating security risks. This book presents
cutting-edge research on the use of AI for biometrics and
cybersecurity including machine and deep learning architectures,
emerging applications and ethical and legal concerns. Topics
include federated learning for enhanced cybersecurity; artificial
intelligence-based biometric authentication using ECG signal; deep
learning for email phishing detection methods; biometrics for
secured IoT systems; intelligent authentication using graphical
one-time-passwords; and AI in social cybersecurity. Artificial
Intelligence for Biometrics and Cybersecurity: Technology and
applications is aimed at artificial intelligence, biometrics and
cybersecurity experts, industry and academic researchers, network
security engineers, cybersecurity professionals, and advanced
students and newcomers to the field interested in the newest
advancements in artificial intelligence for cybersecurity and
biometrics.
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
Focused on the latest mobile technologies, this book addresses
specific features (such as IoT) and their adoptions that aim to
enable excellence in business in Industry 4.0. Furthermore, this
book explores how the adoption of these technologies is related to
rising concerns about privacy and trusted communication issues that
concern management and leaders of business organizations. Managing
IoT and Mobile Technologies with Innovation, Trust, and Sustainable
Computing not only targets IT experts and drills down on the
technical issues but also provides readers from various groups with
a well-linked concept about how the latest trends of mobile
technologies are closely related to daily living and the workplace
at managerial and even individual levels.
Businesses in today's world are adopting technology-enabled
operating models that aim to improve growth, revenue, and identify
emerging markets. However, most of these businesses are not suited
to defend themselves from the cyber risks that come with these
data-driven practices. To further prevent these threats, they need
to have a complete understanding of modern network security
solutions and the ability to manage, address, and respond to
security breaches. The Handbook of Research on Intrusion Detection
Systems provides emerging research exploring the theoretical and
practical aspects of prominent and effective techniques used to
detect and contain breaches within the fields of data science and
cybersecurity. Featuring coverage on a broad range of topics such
as botnet detection, cryptography, and access control models, this
book is ideally designed for security analysts, scientists,
researchers, programmers, developers, IT professionals, scholars,
students, administrators, and faculty members seeking research on
current advancements in network security technology.
This handbook introduces the basic principles and fundamentals of
cyber security towards establishing an understanding of how to
protect computers from hackers and adversaries. The highly
informative subject matter of this handbook, includes various
concepts, models, and terminologies along with examples and
illustrations to demonstrate substantial technical details of the
field. It motivates the readers to exercise better protection and
defense mechanisms to deal with attackers and mitigate the
situation. This handbook also outlines some of the exciting areas
of future research where the existing approaches can be
implemented. Exponential increase in the use of computers as a
means of storing and retrieving security-intensive information,
requires placement of adequate security measures to safeguard the
entire computing and communication scenario. With the advent of
Internet and its underlying technologies, information security
aspects are becoming a prime concern towards protecting the
networks and the cyber ecosystem from variety of threats, which is
illustrated in this handbook. This handbook primarily targets
professionals in security, privacy and trust to use and improve the
reliability of businesses in a distributed manner, as well as
computer scientists and software developers, who are seeking to
carry out research and develop software in information and cyber
security. Researchers and advanced-level students in computer
science will also benefit from this reference.
With the proliferation of devices connected to the internet and
connected to each other, the volume of data collected, stored, and
processed is increasing every day, which brings new challenges in
terms of information security. As big data expands with the help of
public clouds, traditional security solutions tailored to private
computing infrastructures and confined to a well-defined security
perimeter, such as firewalls and demilitarized zones (DMZs), are no
longer effective. New security functions are required to work over
the heterogenous composition of diverse hardware, operating
systems, and network domains. Security, Privacy, and Forensics
Issues in Big Data is an essential research book that examines
recent advancements in big data and the impact that these
advancements have on information security and privacy measures
needed for these networks. Highlighting a range of topics including
cryptography, data analytics, and threat detection, this is an
excellent reference source for students, software developers and
engineers, security analysts, IT consultants, academicians,
researchers, and professionals.
Social media sites are constantly evolving with huge amounts of
scattered data or big data, which makes it difficult for
researchers to trace the information flow. It is a daunting task to
extract a useful piece of information from the vast unstructured
big data; the disorganized structure of social media contains data
in various forms such as text and videos as well as huge real-time
data on which traditional analytical methods like statistical
approaches fail miserably. Due to this, there is a need for
efficient data mining techniques that can overcome the shortcomings
of the traditional approaches. Data Mining Approaches for Big Data
and Sentiment Analysis in Social Media encourages researchers to
explore the key concepts of data mining, such as how they can be
utilized on online social media platforms, and provides advances on
data mining for big data and sentiment analysis in online social
media, as well as future research directions. Covering a range of
concepts from machine learning methods to data mining for big data
analytics, this book is ideal for graduate students, academicians,
faculty members, scientists, researchers, data analysts, social
media analysts, managers, and software developers who are seeking
to learn and carry out research in the area of data mining for big
data and sentiment.
Digital solutions are sufficiently versatile and agile to shape
business processes and enterprise architecture, answer the COVID-19
crisis, solve climate change, temper political conflict, generate
new employment operating models, and solve health issues. These
solutions benefit businesses as an integral part of the economy and
society and therefore must be studied further to ensure they are
utilized appropriately. The Handbook of Research on Digitalization
Solutions for Social and Economic Needs introduces the agile
operating model that has triggered digital transformation and the
plethora of ways it has become of practical use recently. The book
also argues the business rationale of digitalization. Covering key
topics such as innovation, sustainability, and business
transformation, this major reference work is ideal for business
owners, managers, computer scientists, industry professionals,
researchers, scholars, academicians, librarians, policymakers,
practitioners, educators, and students.
With the proliferation of information, big data management and
analysis have become an indispensable part of any system to handle
such amounts of data. The amount of data generated by the multitude
of interconnected devices increases exponentially, making the
storage and processing of these data a real challenge.Big data
management and analytics have gained momentum in almost every
industry, ranging from finance or healthcare. Big data can reveal
key insights if handled and analyzed properly; it has great
application potential to improve the working of any industry. This
book covers the spectrum aspects of big data; from the preliminary
level to specific case studies. It will help readers gain knowledge
of the big data landscape.Highlights of the topics covered include
description of the Big Data ecosystem; real-world instances of big
data issues; how the Vs of Big Data (volume, velocity, variety,
veracity, valence, and value) affect data collection, monitoring,
storage, analysis, and reporting; structural process to get value
out of Big Data and recognize the differences between a standard
database management system and a big data management system.Readers
will gain insights into choice of data models, data extraction,
data integration to solve large data problems, data modelling using
machine learning techniques, Spark's scalable machine learning
techniques, modeling a big data problem into a graph database and
performing scalable analytical operations over the graph and
different tools and techniques for processing big data and its
applications including in healthcare and finance.
Software-defined network (SDN) and network function virtualization
(NFV) are two technology trends that have revolutionized network
management, particularly in highly distributed networks that are
used in public, private, or hybrid cloud services. SDN and NFV
technologies, when combined, simplify the deployment of network
resources, lower capital and operating expenses, and offer greater
network flexibility. The increasing usage of NFV is one of the
primary factors that make SDN adoption attractive. The integration
of these two technologies; SDN and NFV, offer a complementary
service, with NFV delivering many of the real services controlled
in an SDN. While SDN is focused on the control plane, NFV optimizes
the actual network services that manage the data flows. Devices
such as routers, firewalls, and VPN terminators are replaced with
virtual devices that run on commodity hardware in NFV physical
networking. This resembles the 'as-a-service' typical model of
cloud services in many aspects. These virtual devices can be
accessed on-demand by communication, network, or data center
providers.This book illustrates the fundamentals and evolution of
SDN and NFV and highlights how these two technologies can be
integrated to solve traditional networking problems. In addition,
it will focus on the utilization of SDN and NFV to enhance network
security, which will open ways to integrate them with current
technologies such as IoT, edge computing and blockchain, SDN-based
network programmability, and current network orchestration
technologies. The basics of SDN and NFV and associated issues,
challenges, technological advancements along with advantages and
risks of shifting networking paradigm towards SDN are also
discussed. Detailed exercises within the book and corresponding
solutions are available online as accompanying supplementary
material.
The main objective of this book is to provide insights into recent
advances in distributed intelligent circuits, systems and their
applications. Distributed intelligence is the key enabler for
innovations in machine-to-machine communications. The innovations
are directed towards keeping existing algorithms as the base and
developing new intelligent systems by employing smart technologies.
Artificial intelligence (AI) and, more specifically, deep learning
(DL) are receiving significant attention in assisting doctors in
the detection of disease patterns without much human intervention.
In agriculture, robots automate slow, repetitive and dull tasks,
allowing farmers to focus more on improving overall production
yields.The evolving trends point to the interface of artificial
intelligence with machines being a factor in enhancing the
decision-making capabilities of smart machines. This book provides
relevant theoretical frameworks that include basic models,
algorithms, circuit designs and the latest developments in
experimental aspects in the field of distributed intelligence
systems for industrial applications. The challenges encountered in
the development of models for distributed intelligence systems for
environmental monitoring are mitigated with artificial
intelligence, machine learning and deep learning. This book
identifies challenges and helps in applying solutions in the
development of advanced intelligent systems for environmental
monitoring.
This book bridges principles and real-world applications, while
also providing thorough theory and technology for the development
of artificial intelligence and robots. A lack of cross-pollination
between AI and robotics research has led to a lack of progress in
both fields. Now that both technologies have made significant
strides, there is increased interest in combining the two domains
in order to create a new integrated AI and robotics trend. In order
to achieve wiser urbanization and more sustainable development, AI
in smart cities will play a significant part in equipping the
cities with advanced features that will allow residents to safely
move about, stroll, shop, and enjoy a more comfortable way of life.
If you are a student, researcher, engineer, or professional working
in this field, or if you are just curious in the newest
advancements in robotics and artificial intelligence for
cybersecurity, this book is for you!
i. This book will contain AI, ML, DL, big data and security never
before considered ii. Innovative artificial intelligence techniques
and algorithms iii. Only emerging from recent research and
development, e.g. AI for big data from security perspective, which
are not covered in any existing texts iv. Artificial Intelligence
for big data and security Applications with advanced features v.
Key new finding of machine learning and deep learning for Security
Applications
Focuses on the latest development in Big IoT Data Analytics
Presents different issues of Security and Privacy Analytics for
Fog-enabled IoT system Offers the latest Big Data Technologies for
security analytics in Fog-enabled IoT Network Discusses the
emerging role of Big Data Analytics and Technologies in detection
of Cyberattacks in IoT networks Presents the prospects on Big IoT
Data Analytics in Fog-enabled IoT system
Because it makes the distribution and transmission of digital
information much easier and more cost effective, multimedia has
emerged as a top resource in the modern era. In spite of the
opportunities that multimedia creates for businesses and companies,
information sharing remains vulnerable to cyber attacks and hacking
due to the open channels in which this data is being transmitted.
Protecting the authenticity and confidentiality of information is a
top priority for all professional fields that currently use
multimedia practices for distributing digital data. The Handbook of
Research on Multimedia Cyber Security provides emerging research
exploring the theoretical and practical aspects of current security
practices and techniques within multimedia information and
assessing modern challenges. Featuring coverage on a broad range of
topics such as cryptographic protocols, feature extraction, and
chaotic systems, this book is ideally designed for scientists,
researchers, developers, security analysts, network administrators,
scholars, IT professionals, educators, and students seeking current
research on developing strategies in multimedia security.
Simplicity and Uniqueness Structure of the book content Simple
English and Ease of Undersatanding Exhaustive research in the
content of the book
Cloud computing is an indispensable part of the modern Information
and Communication Technology (ICT) systems. Cloud computing
services have proven to be of significant importance, and promote
quickly deployable and scalable IT solutions with reduced
infrastructure costs. However, utilization of cloud also raises
concerns such as security, privacy, latency, and governance, that
keep it from turning into the predominant option for critical
frameworks. As such, there is an urgent need to identify these
concerns and to address them. Cloud Security: Concepts,
Applications and Perspectives is a comprehensive work with
substantial technical details for introducing the state-of-the-art
research and development on various approaches for security and
privacy of cloud services; novel attacks on cloud services; cloud
forensics; novel defenses for cloud service attacks; and cloud
security analysis. It discusses the present techniques and
methodologies, and provides a wide range of examples and
illustrations to effectively show the concepts, applications, and
perspectives of security in cloud computing. This highly
informative book will prepare readers to exercise better protection
by understanding the motivation of attackers and to deal with them
to mitigate the situation. In addition, it covers future research
directions in the domain. This book is suitable for professionals
in the field, researchers, students who are want to carry out
research in the field of computer and cloud security, faculty
members across universities, and software developers engaged in
software development in the field.
With the increasing demand of robots for industrial and domestic
use, it becomes indispensable to ensure their safety, security, and
reliability. Safety, Security and Reliability of Robotic Systems:
Algorithms, Applications, and Technologies provides a broad and
comprehensive coverage of the evolution of robotic systems, as well
as industrial statistics and future forecasts. First, it analyzes
the safety-related parameters of these systems. Then, it covers
security attacks and related countermeasures, and how to establish
reliability in these systems. The later sections of the book then
discuss various applications of these systems in modern industrial
and domestic settings. By the end of this book, you will be
familiarized with the theoretical frameworks, algorithms,
applications, technologies, and empirical research findings on the
safety, security, and reliability of robotic systems, while the
book's modular structure and comprehensive material will keep you
interested and involved throughout. This book is an essential
resource for students, professionals, and entrepreneurs who wish to
understand the safe, secure, and reliable use of robotics in
real-world applications. It is edited by two specialists in the
field, with chapter contributions from an array of experts on
robotics systems and applications.
Unique selling point: * Contains electronics device, Circuits,
systems as well as applications of Integrated Circuits in
healthcare and security never before considered Core audience: *
Researchers and post graduates Place in the market: * Includes key
new finding of electronic devices for Security Applications, and
Integrated Circutis for healthcare and security Applications with
advanced
Smart Card Security: Applications, Attacks, and Countermeasures
provides an overview of smart card technology and explores
different security attacks and countermeasures associated with it.
It covers the origin of smart cards, types of smart cards, and how
they work. It discusses security attacks associated with hardware,
software, data, and users that are a part of smart card-based
systems. The book starts with an introduction to the concept of
smart cards and continues with a discussion of the different types
of smart cards in use today, including various aspects regarding
their configuration, underlying operating system, and usage. It
then discusses different hardware- and software-level security
attacks in smart card-based systems and applications and the
appropriate countermeasures for these security attacks. It then
investigates the security attacks on confidentiality, integrity,
and availability of data in smart card-based systems and
applications, including unauthorized remote monitoring,
communication protocol exploitation, denial of service (DoS)
attacks, and so forth, and presents the possible countermeasures
for these attacks. The book continues with a focus on the security
attacks against remote user authentication mechanisms in smart
card-based applications and proposes a possible countermeasure for
these attacks. Then it covers different communication standards for
smart card-based applications and discusses the role of smart cards
in various application areas as well as various open-source tools
for the development and maintenance of smart card-based systems and
applications. The final chapter explains the role of blockchain
technology for securing smart card-based transactions and quantum
cryptography for designing secure smart card-based algorithms.
Smart Card Security: Applications, Attacks, and Countermeasures
provides you with a broad overview of smart card technology and its
various applications.
A Beginner's Guide to Internet of Things Security focuses on
security issues and developments in the Internet of Things (IoT)
environment. The wide-ranging applications of IoT, including home
appliances, transportation, logistics, healthcare, and smart
cities, necessitate security applications that can be applied to
every domain with minimal cost. IoT contains three layers:
application layer, middleware layer, and perception layer. The
security problems of each layer are analyzed separately to identify
solutions, along with the integration and scalability issues with
the cross-layer architecture of IoT. The book discusses the
state-of-the-art authentication-based security schemes, which can
secure radio frequency identification (RFID) tags, along with some
security models that are used to verify whether an authentication
scheme is secure against any potential security risks. It also
looks at existing authentication schemes and security models with
their strengths and weaknesses. The book uses statistical and
analytical data and explains its impact on the IoT field, as well
as an extensive literature survey focusing on trust and privacy
problems. The open challenges and future research direction
discussed in this book will help to further academic researchers
and industry professionals in the domain of security. Dr. Brij B.
Gupta is an assistant professor in the Department of Computer
Engineering, National Institute of Technology, Kurukshetra, India.
Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer
Engineering, National Institute of Technology, Kurukshetra, India.
Security, privacy, and trust in the Internet of Things (IoT) and
CPS (Cyber-Physical Systems) are different from conventional
security as concerns revolve around the collection and aggregation
of data or transmission of data over the network. Analysis of
cyber-attack vectors and the provision of appropriate mitigation
techniques are essential research areas for these systems. Adoption
of best practices and maintaining a balance between ease of use and
security are, again, crucial for the effective performance of these
systems. Recent Advances in Security, Privacy and Trust for
Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses
and presents techniques and methodologies, as well as a wide range
of examples and illustrations, to effectively show the principles,
algorithms, challenges, and applications of security, privacy, and
trust for IoT and CPS. Book features: Introduces new directions for
research, development, and engineering security, privacy, and trust
of IoT and CPS Includes a wealth of examples and illustrations to
effectively demonstrate the principles, algorithms, challenges, and
applications Covers most of the important security aspects and
current trends not present in other reference books This book will
also serve as an excellent reference in security, privacy, and
trust of IoT and CPS for professionals in this fast-evolving and
critical field. The chapters present high-quality contributions
from researchers, academics, and practitioners from various
national and international organizations and universities.
This book presents state-of-the-art research on security and
privacy- preserving for IoT and 5G networks and applications. The
accepted book chapters covered many themes, including traceability
and tamper detection in IoT enabled waste management networks,
secure Healthcare IoT Systems, data transfer accomplished by
trustworthy nodes in cognitive radio, DDoS Attack Detection in
Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud
Computing, biometric authentication systems for IoT applications,
and many other applications It aspires to provide a relevant
reference for students, researchers, engineers, and professionals
working in this particular area or those interested in grasping its
diverse facets and exploring the latest advances on security and
privacy- preserving for IoT and 5G networks.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Gloria
Sam Smith
CD
R174
R164
Discovery Miles 1 640
The Northman
Alexander Skarsgard, Nicole Kidman, …
Blu-ray disc
(1)
R337
Discovery Miles 3 370
Morbius
Jared Leto, Matt Smith, …
DVD
R374
R210
Discovery Miles 2 100
|