Horizons in Computer Science Research, Volume 21
β Scribed by Thomas S. Clary
- Publisher
- Nova Science Publishers
- Year
- 2022
- Tongue
- English
- Leaves
- 240
- Series
- Horizons in Computer Science Research, 21
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This volume includes six chapters presenting some of the latest updates in computer science research. Chapter One considers possible future directions as to the role of law in relation to cloud computing and related services and how this could offer additional protection for service users. Chapter Two presents an overview of mechanisms for malware detection and response. Chapter Three presents some of the most common cybersecurity problems connected to the COVID-19 pandemic. Chapter Four describes a consistent and suitable plan for IT disaster recovery. Chapter Five provides a comprehensive survey of resource and power management schemes for in-band device-to-device communications. Lastly, Chapter Six presents technologies and approaches developed for digitization of old Romanian documents.
β¦ Table of Contents
Preface
Chapter 1
Future Directions Towards
Effective Legal Regulation
of Cloud Computing
Abstract
Introduction
Overview of the Cloud Computing Sector
Growth of Cloud Computing
Shared Responsibility
Risks within Cloud Computing
Risk Management in Corporate Governance
Risk of Insolvency
Regulatory Framework
Regulation Theory
Regulatory Pluralism in Cloud Computing
Standard Setting
Contractual Approaches
Possible Further Sources of Regulation
Taxation
Competition
Market Dominance of Key Players
Changing Policies
Possible Examples of Anti-Competitive Behaviour
Insolvency
Conclusion
References
Chapter 2
The Current MechanΔ±sms for Malware DetectΔ±on and Response
Abstract
A Short HΔ±story of Malware
Malware Taxonomy
Malware AnalysΔ±s and ClassΔ±fΔ±catΔ±on TechnΔ±ques
Static Analysis Techniques
Extraction of Strings
Symbols
Control Flow Graphs (CFGs)
Literature of Static Malware Analysis and Machine Learning Methods
Dynamic Analysis Techniques
Registry Snapshots
API Call Sequences
Dynamic Taint Analysis
Logging Network Attempts
Dynamic Binary Instrumentation (DBI)
Literature of Dynamic Malware Analysis and Machine Learning Methods
Memory Analysis Techniques
Memory Forensics
Packing and Compression
Code Injection
DLL Injection and Reflective DLL Injection
Process Hollowing
Manual Analysis Detection of Memory Operations
The Literature on Automated Malware Detection with Memory Analysis
Malware Evolution and Its Relation with Contemporary Detection Strategies
Malware Mitigation & Incident Response
Preparation
Detection and Analysis
Containment/Eradication/Recovery
Post-Incident Activity
Conclusion
References
Biographical Sketch
Chapter 3
Phishing in a Pandemic: Hidden Danger of COVID-19
Abstract
Introduction
What is Phishing?
How Hackers Use Panic and Fear to Spread Computer Viruses
Most often Pandemic-Related Phishing Attacks
Medical Data as the Target of Phishing
Protection of Educational Institutions and Students from COVID-19 Phishing Attacks
Protection of Employers and Employees who Work from Home from Phishing Scams during the Pandemic
Fake News Websites and Spreading Panic during the Pandemic
Recommendations for Maintaining Cybersecurity during the Pandemic
Conclusion
References
Biographical Sketch
Chapter 4
IT Disaster Recovery Planning: Establishing and Analyzing the Constructs
Abstract
Introduction
Conceptual Development
Method
Sample
Coding Scheme
Results
Measure Development
Pretest
Item Screening
Measure Evaluation
Method
Analysis
Summary
Implications for Practice
Limitations of the Study
Conclusion
References
Chapter 5
Resource and Power Management for In-Band D2D Communications
Chapter 6
Digitization Technology of Old Romanian Documents Printed in the Cyrillic Script
Contents of Earlier Volumes
Index
Blank Page
π SIMILAR VOLUMES
This book presents original results on the leading edge of computer science research. Each article has been carefully selected in an attempt to present substantial research results across a broad spectrum. Topics discussed include telecommunication network security application of cloud computing in
Neuroscience is the scientific study of the nervous system. The principle mechanism underlying enhanced pain sensitivity is a persistent hyperexcitability of spinal dorsal horn neurons. This book describes cellular mechanisms for the maintained hyperexcitability of spinal dorsal horn neurons mediate
Cardiovascular disease refers to the class of diseases that involve the heart or blood vessels (arteries and veins). While the term technically refers to any disease that affects the cardiovascular system, it is usually used to refer to those related to atherosclerosis (arterial disease). Chronic he