Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Cyber Defense Mechanisms -

Cyber Defense Mechanisms

Security, Privacy, and Challenges
Buch | Softcover
216 Seiten
2024
CRC Press (Verlag)
978-0-367-54096-8 (ISBN)
CHF 79,95 inkl. MwSt
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.

The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.

Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

Gautam Kumar, PhD, is working with Dept. of Computer Science and Engineering, CMR Engineering College, Hyderabad. He received his PhD degree in Computer Science and Engineering from Jaypee University of Information Technology, Himachal Pradesh, India. He did his M.Tech from Rajasthan Technical University and B.E. from Rajiv Gandhi Proudyogiki Vishwavidyalaya, Madhya Pradesh. He is having a professional teaching experience of more than of 14+ years in the various institutions Institute of Engineering and Technology, Rajasthan, ICFAI University, Hyderabad, and Narsimha Reddy Engineering College, Hyderabad, India. He has taught more than of 20 Computer Science & Engineering subjects. His research interests are in the field of Cryptography, Information Security, Algorithms Designs and Analysis. He has published more than 35 research journals and conferences papers of repute in Science Citation Indexed and Scopus Indexed Journals. Till date he is having two patents. He is a Reviewer of (i) Security and Communication Networks, John Wiley & Sons[Indexed in Science Citation Indexed, SCOPUS], (ii) The Computer Journal, Oxford Academic [Indexed in Science Citation Indexed, SCOPUS], & many Reputes of IEEE/ACM International Conferences. In his credit, he is has handled various responsibility such as Institute’s Innovation Council, President from Institute, and Smart-India Hackthon, Convenor (MHRD). Dinesh Kumar Saini is an Associate Professor working with Faculty of Computing, Information Technology, Sohar University, Sultanate of Oman. He is having experience of more than 18+ years in academic. He has handled various administrative posts. He has published more than 120 research journals and conferences papers of repute. He is also part of the editorial and advisory board of several journals and has been editor of several special issues in books and journals. He has supervised various academic R&D projects. His area of expertise in Computer Science and Engineering, Information Technology, Software Systems, Business Administration and Human Resource Management. Nguyen Ha Huy Cuong, PhD, working The University of Danang- College of Information Technology. Ha Huy Cuong Nguyen obtained his doctorate in Computer Science / Resource Allocation Cloud Computing in 2017 from the University of Da Nang. He has published over 30 research papers. His main research interests include the resource allocation, detection, prevention, and avoidance of cloud computing and distributed systems. He serves as a technical committee program member, track chair, session chair and reviewer of many international conferences and journals. He is a guest editor journal “International Journal of Information Technology Project Management (IJITPM)” with Special Issue On: Recent Works on Management and Technological Advancement. He is editor/reviewer for Machine Learning & Networked Collaborative Engineering Journal, Asian Journal For Convergence In Technology (AJCT) Journal, and some international conferences.

Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies

Chapter 2 Defense against the Survivability to Network Strategies

Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems

Chapter 4 Secure Channel Allocation in Cognitive Radio–Wireless Sensor Networks

Chapter 5 Security Issues in IoT Networks

Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario

Chapter 7 Design Principles and Privacy in Cloud Computing

Chapter 8 Big Data Analysis on Smart Tools and Techniques

Chapter 9 Lightweight Security Protocols for Blockchain Technology

Chapter 10 Privacy and Challenges to Data-Intensive Techniques

Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine

Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method

Chapter 13 Web-Based Smart Agriculture System

Index.

Erscheinungsdatum
Reihe/Serie Artificial Intelligence AI: Elementary to Advanced Practices
Zusatzinfo 24 Tables, black and white; 68 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 426 g
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 0-367-54096-7 / 0367540967
ISBN-13 978-0-367-54096-8 / 9780367540968
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich