𝔖 Scriptorium
✦   LIBER   ✦

📁

Cyber Security: Power and Technology

✍ Scribed by Martti Lehto, Pekka Neittaanmäki


Publisher
Springer International Publishing
Year
2018
Tongue
English
Leaves
288
Series
Intelligent Systems, Control and Automation: Science and Engineering 93
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.


✦ Table of Contents


Front Matter ....Pages i-viii
Front Matter ....Pages 1-1
The Modern Strategies in the Cyber Warfare (Martti Lehto)....Pages 3-20
Cyber Capabilities in Modern Warfare (Jim Q. Chen, Alan Dinerman)....Pages 21-30
Developing Political Response Framework to Cyber Hostilities (Jarno Limnéll)....Pages 31-48
Cyber Security Strategy Implementation Architecture in a Value System (Rauno Kuusisto, Tuija Kuusisto)....Pages 49-62
Cyber Deterrence Theory and Practise (Andreas Haggman)....Pages 63-81
Jedi and Starmen—Cyber in the Service of the Light Side of the Force (Torsti Sirén, Aki-Mauri Huhtinen)....Pages 83-98
Alternative Media Ecosystem as a Fifth-Generation Warfare Supra-Combination (Andreas Turunen)....Pages 99-108
Front Matter ....Pages 109-109
Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic (Mikhail Zolotukhin, Timo Hämäläinen)....Pages 111-131
Domain Generation Algorithm Detection Using Machine Learning Methods (Moran Baruch, Gil David)....Pages 133-161
Tailorable Representation of Security Control Catalog on Semantic Wiki (Riku Nykänen, Tommi Kärkkäinen)....Pages 163-177
New Technologies in Password Cracking Techniques (Sudhir Aggarwal, Shiva Houshmand, Matt Weir)....Pages 179-198
Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems (Elad Harison, Nezer Zaidenberg)....Pages 199-217
Stopping Injection Attacks with Code and Structured Data (Ville Tirronen)....Pages 219-231
Algorithmic Life and Power Flows in the Digital World (Valtteri Vuorisalo)....Pages 233-247
Honeypot Utilization for Network Intrusion Detection (Simo Kemppainen, Tiina Kovanen)....Pages 249-270
Security Challenges of IoT-Based Smart Home Appliances (Tuomas Tenkanen, Heli Kallio, Janne Poikolainen)....Pages 271-288

✦ Subjects


Engineering; Communications Engineering, Networks; Systems and Data Security; Models and Principles; Management of Computing and Information Systems


📜 SIMILAR VOLUMES


Cyber Security: Analytics, Technology an
✍ Martti Lehto, Pekka Neittaanmäki 📂 Library 📅 2015 🏛 Springer International Publishing 🌐 English

Contains a unique codification of cyber security Excellent book for students, postgraduates and professionals Gives a profound overview of the most spoken phenomenon of this time <p>The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social p

Cyber Security: Analytics, Technology an
✍ Martti Lehto, Pekka Neittaanmäki (eds.) 📂 Library 📅 2015 🏛 Springer International Publishing 🌐 English

<p><p>The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.</p><p>The book gives a profound idea of the most spoken phenomenon of this time. The book is suit

Cyber Security: Analytics, Technology an
✍ Martti Lehto, Pekka Neittaanmaki 📂 Library 📅 2015 🏛 Springer 🌐 English

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a

Cyber Power: Crime, Conflict and Securit
✍ Solange Ghernaouti-Helie 📂 Library 📅 2013 🏛 EPFL Press,CRC Press 🌐 English

<P>Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-part

Advances in Cyber Security : Technology,
✍ D. Frank Hsu; Dorothy Marinucci 📂 Library 📅 2013 🏛 Fordham University Press 🌐 English

As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Archi

Regulating Cyber Technologies: Privacy V
✍ Nathalie Rébé 📂 Library 📅 2023 🏛 World Scientific 🌐 English

<span>Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world. New technologies ar