<p><p>This book presents the outcomes of the 2019 International Conference on Cyber Security Intelligence and Analytics (CSIA2019), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusi
Advances in Cyber Security and Intelligent Analytics
β Scribed by Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas
- Publisher
- CRC Press
- Year
- 2022
- Tongue
- English
- Leaves
- 310
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking modelsβIoT, SDN, and ICNβto support modern systems requirements. However, they are undergoing rapid changes and need special attention. The main issue faced by these paradigms is that traditional solutions cannot be directly applied to address the challenges. Therefore, there is a significant need to develop improved network management and cyber security solutions. To this end, this book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. More specifically, it presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.
β¦ Table of Contents
Cover
Half Title
Title Page
Copyright Page
Contents
Acknowledgements
Editors
Contributors
1. Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends
2. Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
3. NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework
4. Exploring the possibility of blockchain and smart contract-based digital certificate
5. Senso Scale: A framework to preserve privacy over cloud using sensitivity range
6. Addressing the cybersecurity issues in cloud computing
7. Role of medical image encryption algorithms in cloud platform for teleradiology applications
8. Machine-learning approach for detecting cyberattacks in Medical Internet of Things
9. Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues
10. A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents
11. A detailed cram on artificial intelligence industrial systems 4.0
12. Ensuring liveliness property in safety-critical systems
13. Machine learning for intelligent analytics
14. Secure 3D route optimization of combat vehicles in war field using IoV
15. Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis
16. Containerization in cloud computing for OS-level virtualization
17. An adaptive deep learning approach for stock price forecasting
Index
π SIMILAR VOLUMES
<p><span>This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) de
<p>This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three
This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described i