Handbook of Computer Networks and Cyber Security: Principles and ParadigmsBrij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta Springer Nature, 31. 12. 2019 - Počet stran: 959 This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference. |
Obsah
1 | |
43 | |
A Cloud ComputingCase Study | 62 |
4 A Novel AckIBEBased Secure Cloud Data Management Framework | 91 |
5 A Practicable Machine Learning Solution for SecurityCognizant Data Placement on Cloud Platforms | 111 |
Wired Local Network Attacks and Their Countermeasures | 133 |
7 Security and Privacy Issues in Wireless Sensor and Body Area Networks | 173 |
8 Preventing Security and Privacy Attacks in WBANs | 201 |
21 Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network | 525 |
A Comprehensive Study | 555 |
23 A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems | 585 |
24 Investigation of Security Issues in Distributed System Monitoring | 609 |
25 An Analysis of Provable Security Frameworks for RFID Security | 635 |
26 Computational Techniques for RealTime Credit Card Fraud Detection | 652 |
An Industrial Perspective | 683 |
Current Status and Future Direction | 715 |
9 Underwater Wireless Sensor Networks | 226 |
10 Security Issues in Cognitive Radio Ad Hoc Networks | 247 |
Data and Structural Anonymity | 265 |
12 SOI FinFET for Computer Networks and Cyber Security Systems | 294 |
A Novel Approach to Networks | 313 |
Issues Solutions and Future Directions | 340 |
15 Survey on DDoS Attack Techniques and Solutions in SoftwareDefined Network | 389 |
16 Cooperative Mechanisms for Defending Distributed Denial of Service DDoS Attacks | 420 |
17 Epidemic Modelling for the Spread of Bots Through DDoS Attack in ECommerce Network | 445 |
Key Challenges and Solutions | 460 |
Applications and Secure Data Aggregation | 475 |
20 A Comprehensive Review of Distributed Denial of Service DDoS Attacks in Fog Computing Environment | 493 |
29 QKD Protocols Security Between Theory and Engineering Implementation | 741 |
30 Survey of Security and Privacy Issues on Biometric System | 763 |
31 A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics | 777 |
32 Trees Cryptosignatures and Cyberspace Mobile Agent Interfaces | 806 |
33 PermutationSubstitution Based Image Encryption Algorithms Using Pseudorandom Number Generators | 825 |
34 Recent Trends in Text Steganography with Experimental Study | 849 |
35 Machine Learning Based Intrusion Detection Techniques | 873 |
36 Feature Selection Using a Machine Learning to Classifya Malware | 889 |
CostSensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection | 905 |
Analytics to Uplift Big Social Events Using Forensic Tools | 929 |
A RealTime Simulation Tool for Studying RealWorld Cyberattacks in the Laboratory | 949 |
Další vydání - Zobrazit všechny
Handbook of Computer Networks and Cyber Security: Principles and Paradigms Brij B. Gupta,Gregorio Martinez Perez,Dharma P. Agrawal,Deepak Gupta Náhled není k dispozici. - 2020 |
Handbook of Computer Networks and Cyber Security: Principles and Paradigms Brij B. Gupta,Gregorio Martinez Perez,Dharma P. Agrawal,Deepak Gupta Náhled není k dispozici. - 2021 |
Běžně se vyskytující výrazy a sousloví
algorithm analysis applications architecture authentication Big Data biometric challenges channel classified cloud computing cloud service cognitive radio communication Computer Networks control plane credit card cryptography Cyber Security data plane dataset DDoS attack decision tree decryption defined distributed document dynamic efficient encryption environment FinFET fog computing forwarding devices framework fraud detection function Gupta IEEE implementation integrity intelligent interface International Conference internet of things Journal keyword layer machine learning malicious malware mechanism method mobile cloud computing mobile devices monitoring OpenFlow packets performance Piscataway pixel privacy preserving proposed protocol public key quantum random Retrieved RFID scenarios scheme SDN controller security and privacy sensor nodes server simulation smart social networks software-defined networks solutions steganography storage switch techniques template threats tool traffic UWSNs vehicles vehicular vulnerabilities WBAN wireless sensor networks Wireshark