Cyber Security for Next-Generation Computing Technologies -

Cyber Security for Next-Generation Computing Technologies

Buch | Hardcover
314 Seiten
2024
CRC Press (Verlag)
978-1-032-51899-2 (ISBN)
137,15 inkl. MwSt
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes.

KEY FEATURES



Highlights innovative principles and practices using next generation computing technologies based cybersecurity
Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity
Offers an overview of theoretical, practical, simulation concepts of cybersecurity

Dr. Inam Ullah Khan is a visiting researcher at king’s college London, UK. was a Lecturer at different universities in Pakistan which include Center for Emerging Sciences Engineering & Technology (CESET), Islamabad, Abdul Wali Khan University, Garden and Timergara Campus and University of Swat. He did his Ph.D in Electronics Engineering from Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He had completed his M.S. degree in Electronic Engineering at Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He had done undergraduate degree in Bachelor of Computer Science from Abdul Wali Khan University Mardan, Pakistan.Apart from that his Master’s thesis is published as a book on topic" Route Optimization with Ant Colony Optimization (ACO)" in Germany which is avaliable on Amazon.He is a research scholar; he has published some research papers at international level. More interestingly he recently introduced a novel routing protocol E-ANTHOCNET in the area of flying ad hoc networks. His research interest includes Network System Security, Intrusion Detection, Intrusion Prevention, cryptography, Optimization techniques, WSN, IoT, UAV’s, Mobile Ad Hoc Networks (MANETS), Flying Ad Hoc Networks, and Machine Learning. He has served international conferences as Technical program committee member which include, EAI International Conference on Future Intelligent Vehicular Technologies, Islamabad, Pakistan and 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26-27, 2018 and now recently working on the same level at International Workshop on Computational Intelligence and Cybersecurity in Emergent Networks (CICEN’21) that will be held in conjunction with the 12th International Conference on Ambient Systems, Networks and Technologies (EUSPN 2021) which is co-organized in November 1-4, 2021, Leuven, Belgium. He has published more than 20 research papers (this includes book chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts) and 3 edited books. Dr. Mariya Ouaissa is currently a Professor at Institute Specializing in New Information and Communication Technologies, Researcher Associate and practitioner with industry and academic experience. She is a Ph.D. graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga, Morocco. She is a Co-Founder and IT Consultant at IT Support and Consulting Center. She was working for School of Technology of Meknes Morocco as a Visiting Professor from 2013 to 2021. She is member of the International Association of Engineers and International Association of Online Engineering, and since 2021, she is an "ACM Professional Member". She is Expert Reviewer with Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has served and continues to serve on technical program and organizer committees of several conferences and events and has organized many Symposiums/Workshops/Conferences as a General Chair also as a reviewer of numerous international journals. Dr. Ouaissa has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained networks security. Her main research topics are IoT, M2M, D2D, WSN, Cellular Networks, and Vehicular Networks. She has published over 40 papers (book chapters, international journals, and conferences/workshops), 10 edited books, and 8 special issue as guest editor. Dr. Mariyam Ouaissa is currently a Professor at Institute specializing in new information and communication technologies, Researcher Associate and Consultant Trainer in Computer Science and Networks. She received her Ph.D. degree in 2019 from National Graduate School of Arts and Crafts, Meknes, Morocco and her Engineering Degree in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a communication and networking researcher and practitioner with industry and academic experience. Dr Ouaissa's research is multidisciplinary that focuses on Internet of Things, M2M, WSN, vehicular communications and cellular networks, security networks, congestion overload problem and the resource allocation management and access control. She is serving as a reviewer for international journals and conferences including as IEEE Access, Wireless Communications and Mobile Computing. Since 2020, she is a member of "International Association of Engineers IAENG" and "International Association of Online Engineering", and since 2021, she is an "ACM Professional Member". She has published more than 30 research papers (this includes book chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts), 10 edited books, and 6 special issue as guest editor. She has served on Program Committees and Organizing Committees of several conferences and events and has organized many Symposiums / Workshops / Conferences as a General Chair. Dr. Zakaria Abou El Houda currentlly Professor at L@bisen, Yncrea Oust France, She was a researcher at the Department of Computer Science and Operations Research, Université de Montréal, Montréal, Canada. He received the M.Sc. degree in computer networks from Paul Sabatier University, Toulouse, France, the Ph.D. degree in computer science from the University of Montréal, Canada and the Ph.D. degree in computer engineering from the University of Technology of Troyes, Troyes, France. He has made contributions in the fields of Information security, intrusion detection/prevention system, and security in software defined network. His current research interests include ML/DL-based intrusion detection, Federated learning, and Blockchain. He has also served and continues to serve on technical program committees and as a reviewer of several international conferences and journals, including IEEE ICC, IEEE Globecom, and IEEE transactions. Dr. Muhammad Fazal Ijaz received his B.Eng. degree in Industrial Engineering and Management from University of the Punjab, Lahore, Pakistan, in 2011, and Dr. Eng. degree in Industrial and Systems Engineering from Dongguk University, Seoul, South Korea, in 2019. From 2019 to 2020, he worked as an Assistant Professor in Department of Industrial and Systems Engineering, Dongguk University, Seoul, South Korea. Currently, he is working as an Assistant Professor in Department of Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea. He has published numerous research articles in several international peer-reviewed journals, including Scientific Reports, IEEE Transactions on Industrial Informatics, IEEE Access, Sensors, Journal of Food Engineering, Applied Sciences, and Sustainability. His research interests include Machine learning, Blockchain, Healthcare Engineering, Internet of Things, Big data, and Data mining.

Chapter 1 Cyber Security: Future Trends and Solutions

Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar

Chapter 2 Security and Intelligent Management: Survey

Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, and Muhammad Allah Rakha

Chapter 3 Comparative Analysis of Machine and Deep Learning for Cyber Security

Hafsa Maryam, Syeda Zillay Nain Zukhraf, and Rehmat Ullah

Chapter 4 AI-Based Secure Wireless Communication Technologies and Cyber Threats for IoT Networks

Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, and Salma El Hajjami

Chapter 5 Cyber Threat Actors Review: Examining the Tactics and Motivations of Adversaries in the Cyber Landscape

Zakaria Abou El Houda

Chapter 6 Layer-Based Security Threats in IoT Networks

Muna Muhammad, Ahthasham Sajid, and Hira Arshad

Chapter 7 Intrusion Detection System Using AI and Machine Learning Algorithm

Muhammad Tehmasib Ali Tashfeen

Chapter 8 Signature-Based Intrusion Detection System for IoT

Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, and Muhammad Fayaz

Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the MQTT-IoT-IDS2020 Dataset

Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, and Muhammad Yaseen Ayub

Chapter 10 Cyber Security for Edge/Fog Computing Applications

Hanane Lamaazi

Chapter 11 Cyber Attacks Against Intelligent Transportation Systems

Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid

Chapter 12 Intelligent Transportation Systems for IoT-Based UAV Networks

Mamoona Jamil, Usman Haider, Inam Ullah Khan, and Tarandeep Kaur Bhatia

Chapter 13 Cyber Attack Detection Analysis Using Machine Learning

for IoT-Based UAV Network

Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia, and Inam Ullah Khan

Chapter 14 Blockchain Solutions for Cyber Criminals

Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, and Bhupendra Kumar Soni

Chapter 15 Blockchain Security Measures to Combat Cyber Crime Rahmeh Ibrahim and Qasem Abu Al-Haija

Chapter 16 AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective

Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman Khan, and Inam Ullah Khan

Erscheinungsdatum
Reihe/Serie Advances in Cybersecurity Management
Zusatzinfo 26 Tables, black and white; 55 Line drawings, black and white; 29 Halftones, black and white; 84 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 766 g
Themenwelt Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Web / Internet
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
ISBN-10 1-032-51899-5 / 1032518995
ISBN-13 978-1-032-51899-2 / 9781032518992
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Ein einführendes Lehrbuch

von Wolfgang Riggert; Ralf Lübben

Buch | Hardcover (2022)
Hanser, Carl (Verlag)
34,99
das umfassende Handbuch für den Einstieg in die Netzwerktechnik

von Martin Linten; Axel Schemberg; Kai Surendorf

Buch | Hardcover (2023)
Rheinwerk (Verlag)
29,90