Cyber Defense Mechanisms
CRC Press (Verlag)
978-0-367-40883-1 (ISBN)
The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.
Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.
Gautam Kumar, PhD, is working with Dept. of Computer Science and Engineering, CMR Engineering College, Hyderabad. He received his PhD degree in Computer Science and Engineering from Jaypee University of Information Technology, Himachal Pradesh, India. He did his M.Tech from Rajasthan Technical University and B.E. from Rajiv Gandhi Proudyogiki Vishwavidyalaya, Madhya Pradesh. He is having a professional teaching experience of more than of 14+ years in the various institutions Institute of Engineering and Technology, Rajasthan, ICFAI University, Hyderabad, and Narsimha Reddy Engineering College, Hyderabad, India. He has taught more than of 20 Computer Science & Engineering subjects. His research interests are in the field of Cryptography, Information Security, Algorithms Designs and Analysis. He has published more than 35 research journals and conferences papers of repute in Science Citation Indexed and Scopus Indexed Journals. Till date he is having two patents. He is a Reviewer of (i) Security and Communication Networks, John Wiley & Sons[Indexed in Science Citation Indexed, SCOPUS], (ii) The Computer Journal, Oxford Academic [Indexed in Science Citation Indexed, SCOPUS], & many Reputes of IEEE/ACM International Conferences. In his credit, he is has handled various responsibility such as Institute’s Innovation Council, President from Institute, and Smart-India Hackthon, Convenor (MHRD). Dinesh Kumar Saini is an Associate Professor working with Faculty of Computing, Information Technology, Sohar University, Sultanate of Oman. He is having experience of more than 18+ years in academic. He has handled various administrative posts. He has published more than 120 research journals and conferences papers of repute. He is also part of the editorial and advisory board of several journals and has been editor of several special issues in books and journals. He has supervised various academic R&D projects. His area of expertise in Computer Science and Engineering, Information Technology, Software Systems, Business Administration and Human Resource Management. Nguyen Ha Huy Cuong, PhD, working The University of Danang- College of Information Technology. Ha Huy Cuong Nguyen obtained his doctorate in Computer Science / Resource Allocation Cloud Computing in 2017 from the University of Da Nang. He has published over 30 research papers. His main research interests include the resource allocation, detection, prevention, and avoidance of cloud computing and distributed systems. He serves as a technical committee program member, track chair, session chair and reviewer of many international conferences and journals. He is a guest editor journal “International Journal of Information Technology Project Management (IJITPM)” with Special Issue On: Recent Works on Management and Technological Advancement. He is editor/reviewer for Machine Learning & Networked Collaborative Engineering Journal, Asian Journal For Convergence In Technology (AJCT) Journal, and some international conferences.
Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio–Wireless Sensor Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.
Erscheinungsdatum | 10.09.2020 |
---|---|
Reihe/Serie | Artificial Intelligence AI: Elementary to Advanced Practices |
Zusatzinfo | 24 Tables, black and white; 68 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 453 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-367-40883-X / 036740883X |
ISBN-13 | 978-0-367-40883-1 / 9780367408831 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich