|
Showing 1 - 10 of
10 matches in All Departments
Digital forensics deals with the investigation of cybercrimes. With
the growing deployment of cloud computing, mobile computing, and
digital banking on the internet, the nature of digital forensics
has evolved in recent years, and will continue to do so in the near
future.This book presents state-of-the-art techniques to address
imminent challenges in digital forensics. In particular, it focuses
on cloud forensics, Internet-of-Things (IoT) forensics, and network
forensics, elaborating on innovative techniques, including
algorithms, implementation details and performance analysis, to
demonstrate their practicality and efficacy. The innovations
presented in this volume are designed to help various stakeholders
with the state-of-the-art digital forensics techniques to
understand the real world problems. Lastly, the book will answer
the following questions: How do the innovations in digital
forensics evolve with the emerging technologies? What are the
newest challenges in the field of digital forensics?
This book provides a comprehensive review of the most up to date
research related to cloud security auditing and discusses auditing
the cloud infrastructure from the structural point of view, while
focusing on virtualization-related security properties and
consistency between multiple control layers. It presents an
off-line automated framework for auditing consistent isolation
between virtual networks in OpenStack-managed cloud spanning over
overlay and layer 2 by considering both cloud layers' views. A
runtime security auditing framework for the cloud with special
focus on the user-level including common access control and
authentication mechanisms e.g., RBAC, ABAC and SSO is covered as
well. This book also discusses a learning-based proactive security
auditing system, which extracts probabilistic dependencies between
runtime events and applies such dependencies to proactively audit
and prevent security violations resulting from critical events.
Finally, this book elaborates the design and implementation of a
middleware as a pluggable interface to OpenStack for intercepting
and verifying the legitimacy of user requests at runtime. Many
companies nowadays leverage cloud services for conducting major
business operations (e.g., Web service, inventory management,
customer service, etc.). However, the fear of losing control and
governance still persists due to the inherent lack of transparency
and trust in clouds. The complex design and implementation of cloud
infrastructures may cause numerous vulnerabilities and
misconfigurations, while the unique properties of clouds (elastic,
self-service, multi-tenancy) can bring novel security challenges.
In this book, the authors discuss how state-of-the-art security
auditing solutions may help increase cloud tenants' trust in the
service providers by providing assurance on the compliance with the
applicable laws, regulations, policies, and standards. This book
introduces the latest research results on both traditional
retroactive auditing and novel (runtime and proactive) auditing
techniques to serve different stakeholders in the cloud. This book
covers security threats from different cloud abstraction levels and
discusses a wide-range of security properties related to
cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO
27017). It also elaborates on the integration of security auditing
solutions into real world cloud management platforms (e.g.,
OpenStack, Amazon AWS and Google GCP). This book targets industrial
scientists, who are working on cloud or security-related topics, as
well as security practitioners, administrators, cloud providers and
operators.Researchers and advanced-level students studying and
working in computer science, practically in cloud security will
also be interested in this book.
|
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19â22, 2023, Proceedings (1st ed. 2023)
Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, …
|
R2,685
Discovery Miles 26 850
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the satellite workshops
held around the 21st International Conference on Applied
Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan,
in June 2023.The 34 full papers and 13 poster papers presented in
this volume were carefully reviewed and selected from 76
submissions. They stem from the following workshops: ¡ 1st
ACNS Workshop on Automated Methods and Data-driven Techniques in
Symmetric-key Cryptanalysis (ADSC 2023)
¡       5th ACNS
Workshop on Application Intelligence and Blockchain Security
(AIBlock 2023) ¡      Â
4th ACNS Workshop on Artificial Intelligence in Hardware Security
(AIHWS 2023) ¡      Â
5th ACNS Workshop on Artificial Intelligence and Industrial IoT
Security (AIoTS 2023)
¡       3rd ACNS
Workshop on Critical Infrastructure and Manufacturing System
Security (CIMSS 2023)
¡       5th ACNS
Workshop on Cloud Security and Privacy (Cloud S&P 2023)
¡       4th ACNS
Workshop on Secure Cryptographic Implementation (SCI 2023)
¡       4th ACNS
Workshop on Security in Mobile Technologies (SecMT 2023)
¡       5th ACNS
Workshop on Security in Machine Learning and its Applications
(SiMLA 2023)
|
Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar
|
R3,320
Discovery Miles 33 200
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 16th
International Conference on Network and System Security, NSS 2022,
held in Denarau Island, Fiji, on December 9-12, 2022. The 23 full
and 18 short papers presented in this book were carefully reviewed
and selected from 83 submissions. They focus on theoretical and
practical aspects of network and system security, such as
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability of computer
networks and systems.
|
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings (Paperback, 1st ed. 2022)
Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, …
|
R1,644
Discovery Miles 16 440
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the satellite workshops
held around the 20th International Conference on Applied
Cryptography and Network Security, ACNS 2022, held in Rome, Italy,
in June 2022. Due to the Corona pandemic the workshop was held as a
virtual event. The 31 papers presented in this volume were
carefully reviewed and selected from 52 submissions. They stem from
the following workshops: - AIBlock: 4th ACNS Workshop on
Application Intelligence and Blockchain Security - AIHWS: 3rd ACNS
Workshop on Artificial Intelligence in Hardware Security - AIoTS:
4th ACNS Workshop on Artificial Intelligence and Industrial IoT
Security - CIMSS: 2nd ACNS Workshop on Critical Infrastructure and
Manufacturing System Security - Cloud S&P: 4th ACNS Workshop on
Cloud Security and Privacy - SCI: 3rd ACNS Workshop on Secure
Cryptographic Implementation - SecMT: 3rd ACNS Workshop on Security
in Mobile Technologies - SiMLA: 4th ACNS Workshop on Security in
Machine Learning and its Applications
|
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings (Paperback, 1st ed. 2021)
Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, …
|
R2,747
Discovery Miles 27 470
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the satellite workshops
held around the 19th International Conference on Applied
Cryptography and Network Security, ACNS 2021, held in Kamakura,
Japan, in June 2021.The 26 papers presented in this volume were
carefully reviewed and selected from 49 submissions. They stem from
the following workshops: AIBlock 2021: Third International Workshop
on Application Intelligence and Blockchain Security AIHWS 2021:
Second International Workshop on Artificial Intelligence in
Hardware Security AIoTS 2021: Third International Workshop on
Artificial Intelligence and Industrial IoT Security CIMSS 2021:
First International Workshop on Critical Infrastructure and
Manufacturing System Security Cloud S&P 2021: Third
International Workshop on Cloud Security and Privacy SCI 2021:
Second International Workshop on Secure Cryptographic
Implementation SecMT 2021: Second International Workshop on
Security in Mobile Technologies SiMLA 2021; Third International
Workshop on Security in Machine Learning and its Applications Due
to the Corona pandemic the workshop was held as a virtual event.
|
Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings (Paperback, 1st ed. 2021)
Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar
|
R2,675
Discovery Miles 26 750
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 11th
International Conference on Digital Forensics and Cyber Crime,
ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19
pandemic the conference was held virtually. The 11 reviewed full
papers and 4 short papers were selected from 35 submissions and are
grouped in topical sections on digital forensics; cyber-physical
system Forensics; event reconstruction in digital forensics;
emerging topics in forensics; cybersecurity and digital forensics.
|
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings (Paperback, 1st ed. 2020)
Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man-Ho Au, Lejla Batina, …
|
R3,272
Discovery Miles 32 720
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the satellite workshops
held around the 18th International Conference on Applied
Cryptography and Network Security, ACNS 2020, in Rome, Italy, in
October 2020. The 31 papers presented in this volume were carefully
reviewed and selected from 65 submissions. They stem from the
following workshops: AIBlock 2020: Second International Workshop on
Application Intelligence and Blockchain Security AIHWS 2020: First
International Workshop on Artificial Intelligence in Hardware
Security AIoTS 2020: Second International Workshop on Artificial
Intelligence and Industrial Internet-of-Things Security Cloud
S&P 2020: Second International Workshop on Cloud Security and
Privacy SCI 2020: First International Workshop on Secure
Cryptographic Implementation SecMT 2020: First International
Workshop on Security in Mobile Technologies SiMLA 2020: Second
International Workshop on Security in Machine Learning and its
Applications
This book provides a comprehensive review of the most up to date
research related to cloud security auditing and discusses auditing
the cloud infrastructure from the structural point of view, while
focusing on virtualization-related security properties and
consistency between multiple control layers. It presents an
off-line automated framework for auditing consistent isolation
between virtual networks in OpenStack-managed cloud spanning over
overlay and layer 2 by considering both cloud layers' views. A
runtime security auditing framework for the cloud with special
focus on the user-level including common access control and
authentication mechanisms e.g., RBAC, ABAC and SSO is covered as
well. This book also discusses a learning-based proactive security
auditing system, which extracts probabilistic dependencies between
runtime events and applies such dependencies to proactively audit
and prevent security violations resulting from critical events.
Finally, this book elaborates the design and implementation of a
middleware as a pluggable interface to OpenStack for intercepting
and verifying the legitimacy of user requests at runtime. Many
companies nowadays leverage cloud services for conducting major
business operations (e.g., Web service, inventory management,
customer service, etc.). However, the fear of losing control and
governance still persists due to the inherent lack of transparency
and trust in clouds. The complex design and implementation of cloud
infrastructures may cause numerous vulnerabilities and
misconfigurations, while the unique properties of clouds (elastic,
self-service, multi-tenancy) can bring novel security challenges.
In this book, the authors discuss how state-of-the-art security
auditing solutions may help increase cloud tenants' trust in the
service providers by providing assurance on the compliance with the
applicable laws, regulations, policies, and standards. This book
introduces the latest research results on both traditional
retroactive auditing and novel (runtime and proactive) auditing
techniques to serve different stakeholders in the cloud. This book
covers security threats from different cloud abstraction levels and
discusses a wide-range of security properties related to
cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO
27017). It also elaborates on the integration of security auditing
solutions into real world cloud management platforms (e.g.,
OpenStack, Amazon AWS and Google GCP). This book targets industrial
scientists, who are working on cloud or security-related topics, as
well as security practitioners, administrators, cloud providers and
operators.Researchers and advanced-level students studying and
working in computer science, practically in cloud security will
also be interested in this book.
|
Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings (Paperback, 1st ed. 2019)
Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, …
|
R1,539
Discovery Miles 15 390
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the satellite workshops
held around the 17th International Conference on Applied
Cryptography and Network Security, ACNS 2019, in Bogota, Colombia,
in June 2019. The 10 papers presented in this volume were carefully
reviewed and selected from 30 submissions. They stem from the
following workshops: AIBlock 2019: First International Workshop on
Application Intelligence and Blockchain SecurityAIoTS 2019:First
International Workshop on Articial Intelligence and Industrial
Internet-of-Things SecurityCloud S&P 2019:First International
Workshop on Cloud Security and PrivacyPriDA 2019:First
InternationalWorkshop on Privacy-preserving Distributed Data
AnalysisSiMLA 2019: First International Workshop on Security in
Machine Learning and its Applications
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
She Said
Carey Mulligan, Zoe Kazan, …
DVD
R93
Discovery Miles 930
Tenet
John David Washington, Robert Pattinson
Blu-ray disc
(1)
R50
Discovery Miles 500
|