𝔖 Scriptorium
✦   LIBER   ✦

📁

Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing)

✍ Scribed by Shishir K. Shandilya (editor), Neal Wagner (editor), Atulya K. Nagar (editor)


Publisher
Springer
Year
2020
Tongue
English
Leaves
153
Edition
1st ed. 2020
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

✦ Table of Contents


Preface
Contents
About the Editors
Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses
1 Introduction
2 Methods
2.1 Attacker–Defender Game Scenario
2.2 Finite State Machine Strategy Encoding
2.3 Evolutionary Algorithm
3 Experiments
3.1 Simulation Initialization
3.2 Attacker’s Response to Diversity and Randomization Defense
3.3 Patterns of Attacker Investment in Zero-Day Exploit Creation
3.4 Engagement Duration Effects
4 Conclusion
References
Deep Reinforcement Learning for Adaptive Cyber Defense and Attacker’s Pattern Identification
1 Introduction
2 Related Works
3 Research Method and Material
4 Result and Discussion
5 Conclusion and Future Works
References
Dynamic Recognition of Phishing URLs Using Deep Learning Techniques
1 Introduction
1.1 Problem Statement
1.2 Background and Motivation
1.3 Challenges in Detecting Phishing URLs
1.4 Objective of Study
1.5 Scope and Limitation
2 Literature Review
2.1 Phishing URL Detection Methods
3 Proposed Approach
3.1 URL Collection
3.2 Preprocessing and Feature Extraction
3.3 Pre-training of the Features and Feature Selection
3.3.1 Deep Boltzmann Machine-Based Feature Selection
3.3.2 Deep Stacked Auto-Encoder-Based Feature Selection
3.4 Detection and Classification
4 Experimental Results
4.1 Data Sets
4.1.1 Conventional Dataset
4.1.2 Phishing Dataset
4.2 Effect of Dynamic Feature Extraction and Pre-training
4.3 Experimental Results on Feature Selection
4.4 Evaluation Measures
4.5 Comparison of Deep Learning Results with Machine Learning Techniques
4.5.1 R and RStudio (Statistical & Qualitative Data Analysis Software 2019)
5 Conclusion
References
Efficient Reconfigurable Integrated Cryptosystems for Cybersecurity Protection
1 Introduction
1.1 Effective Utilization of Existing Cryptographic Mechanisms
1.2 Consideration of the Application Areas
1.3 Attack Types and the Required Cryptographic Security Services
1.4 End-to-End Security
1.5 Implementation Platforms
2 Related Works
3 The Selected Algorithms
3.1 Cryptographic Algorithms Selected for High-Performance Platforms’ Security
3.2 Cryptographic Algorithms Selected for Constrained Devices’ Security
4 Implementation of Integrated Cryptosystems for High- Performance Platforms
4.1 Description of the Method
4.2 Implementation Approaches
4.3 Results
5 Healthcare IoT Comprising Constrained and High- Performance Platforms
5.1 The Proposed Method
5.2 Implementation Approaches
5.3 Results
6 Conclusions
References
Data Analytics for Security Management of Complex Heterogeneous Systems: Event Correlation and Security Assessment Tasks
1 Introduction
2 The Peculiarities of Event Correlation and Security Assessment
3 Related Work
4 The Proposed Approaches to Security Event Correlation and Security Assessment
4.1 Security Data Correlation
4.2 Security Assessment
4.2.1 Input Data Collection
4.2.2 Calculation of Security Metrics
Assets Criticality Assessment
Probability Assessment
Security Incidents Processing
4.2.3 Definition of Security Level
5 Experiments and Discussion
5.1 Identification of Event Types
5.2 Identification of Property and Assets Types
6 Conclusion
References
Cybersecurity Technologies for the Internet of Medical Wearable Devices (IoMWD)
1 Introduction
2 Internet of Medical Wearable Devices (IoMWD) Security Vulnerability Analysis
3 Technologies and Architectures for Secure IoMWD
4 IoT Edge and Cloud Cyberattacks
5 IoMWD Cybersecurity Framework
6 Future Challenges on IoMWD Security
References
Index


📜 SIMILAR VOLUMES


Security Incidents & Response Against Cy
✍ Akashdeep Bhardwaj (editor), Varun Sapra (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response

Blockchain Security in Cloud Computing (
✍ K.M. Baalamurugan (editor), S. Rakesh Kumar (editor), Abhishek Kumar (editor), V 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boos

Blockchain Security in Cloud Computing (
✍ K.M. Baalamurugan (editor), S. Rakesh Kumar (editor), Abhishek Kumar (editor), V 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security whil

International Conference on Computing, C
✍ Arulmurugan Ramu (editor), Chow Chee Onn (editor), M.G. Sumithra (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book presents selected papers from the International Conference on Computing, Communication, Electrical and Biomedical Systems (ICCCEBS 2021), held in March 2021 at KPR College of Engineering and Technology, Coimbatore, Tamil Nadu, India. The conference explores the interface between indu

Advances in Artificial Intelligence for
✍ Mukhdeep Singh Manshahia (editor), Valeriy Kharchenko (editor), Gerhard-Wilhelm 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book provides readers with emerging research that explores the theoretical and practical aspects of implementing new and innovative artificial intelligence (AI) techniques for renewable energy systems. The contributions offer broad coverage on economic and promotion policies of renewable