Information Security Practices

Emerging Threats and Perspectives
Buch | Hardcover
VII, 104 Seiten
2017 | 1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-48946-9 (ISBN)

Lese- und Medienproben

Information Security Practices -
128,39 inkl. MwSt

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.  

Professor Issa Traore has a Ph.D. in Software Engineering from Institute Nationale Polytechnique - Toulouse, France. Dr. Traore is the Co-Founder and Chief Scientist of Plurilock Security Solutions Inc. Plurilock delivers biometrics security and online fraud detection solutions to the global market. Dr. Traore is also a full Professor at the University of Victoria, Department of Electrical and Computer Engineering since 1999. He is the founder and Coordinator of the Information Security and Object Technology (ISOT) Laboratory. He is the co-author of the first book on continuous authentication using biometric technologies and the first book on gait biometrics based on the ground reaction force (GRF). He has been granted two US patents on behavioral biometrics and emerging authentication technologies. He has published over 130 papers in archival journals and conferences on network security and biometrics technologies. Dr. Ahmed Awad is an Associate Professor in the Department of Computer Science, NYIT Vancouver Campus. His main research interest is focused on Security Engineering, Human Computer Interaction, and Biometrics. Dr. Awad worked as a Software Design Engineer, Architect, Project Manager, and Security Consultant at a number of leading software firms and enterprises. He is the co-founder of Plurilock Security Solutions Inc. Dr. Awad received Ph.D. in Electrical and Computer Engineering from the University of Victoria, Victoria, BC, Canada in 2008. Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada,. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broad band (DABNEL) Lab. Dr. Woungang has published 8 books and over 89 refereed technical articles in scholarly international journals and proceedings of international conferences. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier), and the International Journal of Communication Systems (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier), Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). Since January 2012, he is serving as Chair of Computer Chapter, IEEE Toronto Section.

Chapter 1.Introduction - Emerging Threats call for New Security Paradigms.- Chapter 2. Botnets Threat Analysis and Detection.- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics.- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis.- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis.- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication.- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection.- Chapter 8. Conclusion: Future Trends and Challenges.

Erscheinungsdatum
Zusatzinfo VII, 104 p. 51 illus., 31 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte biometrics • Communications Engineering, Networks • Communications engineering / telecommunications • Computer networking and communications • Computer Security • computer vision • cyber security • Engineering • Engineering: general • information assurance • Information Authentication • Information Authorization • Information Privacy • Information protection • Information Systems and Communication Service • Intrusion Protection • Network Security • pattern recognition • Security and fire alarm systems • Security Science and Technology • systems and data security
ISBN-10 3-319-48946-1 / 3319489461
ISBN-13 978-3-319-48946-9 / 9783319489469
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Wegweiser für Elektrofachkräfte

von Gerhard Kiefer; Herbert Schmolke; Karsten Callondann

Buch | Hardcover (2024)
VDE VERLAG
48,00