Handbook of Computer Networks and Cyber Security: Principles and Paradigms

Přední strana obálky
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Springer Nature, 31. 12. 2019 - Počet stran: 959
0 Recenze
Google recenze neověřuje, ale kontroluje a odstraňuje podvodný obsah, pokud je identifikován
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented.
Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook.
This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
 

Co říkají ostatní - Napsat recenzi

Na obvyklých místech jsme nenalezli žádné recenze.

Vybrané stránky

Obsah

1 Security Frameworks in Mobile Cloud Computing
1
2 An Investigation Study of Privacy Preserving in Cloud Computing Environment
43
A Cloud ComputingCase Study
62
4 A Novel AckIBEBased Secure Cloud Data Management Framework
91
5 A Practicable Machine Learning Solution for SecurityCognizant Data Placement on Cloud Platforms
111
Wired Local Network Attacks and Their Countermeasures
133
7 Security and Privacy Issues in Wireless Sensor and Body Area Networks
173
8 Preventing Security and Privacy Attacks in WBANs
201
21 Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network
525
A Comprehensive Study
555
23 A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems
585
24 Investigation of Security Issues in Distributed System Monitoring
609
25 An Analysis of Provable Security Frameworks for RFID Security
635
26 Computational Techniques for RealTime Credit Card Fraud Detection
652
An Industrial Perspective
683
Current Status and Future Direction
715

9 Underwater Wireless Sensor Networks
226
10 Security Issues in Cognitive Radio Ad Hoc Networks
247
Data and Structural Anonymity
265
12 SOI FinFET for Computer Networks and Cyber Security Systems
294
A Novel Approach to Networks
313
Issues Solutions and Future Directions
340
15 Survey on DDoS Attack Techniques and Solutions in SoftwareDefined Network
389
16 Cooperative Mechanisms for Defending Distributed Denial of Service DDoS Attacks
420
17 Epidemic Modelling for the Spread of Bots Through DDoS Attack in ECommerce Network
445
Key Challenges and Solutions
460
Applications and Secure Data Aggregation
475
20 A Comprehensive Review of Distributed Denial of Service DDoS Attacks in Fog Computing Environment
493
29 QKD Protocols Security Between Theory and Engineering Implementation
741
30 Survey of Security and Privacy Issues on Biometric System
763
31 A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics
777
32 Trees Cryptosignatures and Cyberspace Mobile Agent Interfaces
806
33 PermutationSubstitution Based Image Encryption Algorithms Using Pseudorandom Number Generators
825
34 Recent Trends in Text Steganography with Experimental Study
849
35 Machine Learning Based Intrusion Detection Techniques
873
36 Feature Selection Using a Machine Learning to Classifya Malware
889
CostSensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection
905
Analytics to Uplift Big Social Events Using Forensic Tools
929
A RealTime Simulation Tool for Studying RealWorld Cyberattacks in the Laboratory
949
Autorská práva

Další vydání - Zobrazit všechny

Běžně se vyskytující výrazy a sousloví

O autorovi (2019)

Brij B. Gupta received his PhD degree from the Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for the Canadian Commonwealth Scholarship award by the Government of Canada. He has published more than 150 research papers (including 04 books and 18 book chapters) in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Inderscience, etc. He has visited several countries, i.e. Canada, Japan, Australia, China, Spain, Hong-Kong, Italy, Malaysia, Macau, etc. to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. In addition, he has been selected in 2017 to receive the Albert Nelson Marquis Lifetime Achievement Award’ by Marquis Who's Who in the World, USA. He also received the Sir Visvesvaraya Young Faculty Research Fellowship Award in 2017 from the Ministry of Electronics and Information Technology, Government of India. Recently, he has been awarded with ‘2018 Best Faculty Award for research activities’ and ‘2018 Best Faculty Award for Project and Laboratory Development’ from the National Institute of Technology Kurukshetra, India.

Gregorio Martínez Pérez received a Ph.D. degree in Computer Science at the University of Murcia (Spain). In 1997 he started working in Computer Service of the same University on various projects on end-user products related to security and networking, and in 2014 he was appointed as Full Professor in the same department. His scientific activity is mainly devoted to cybersecurity, privacy and 5G networking, including security considerations, management models, network slicing and communication architectures. He is also working on the design and autonomic monitoring of real-time and critical applications and systems. He is working on different national (14 in the last decade) and European IST research projects (11 in the last decade) related to these topics, being Principal Investigator in most of them. He has published more than 160 papers in national and international conference proceedings, magazines and journals. He has been guest editing more than 30 special issues in different journals and magazines in the last few years. He is member of the editorial board of 16 journals, most of them related to the topics being covered in this handbook. He has already supervised 10 PhD students, several of them recognized with honors. He is currently the Deputy Director for Knowledge Transfer of the University of Murcia.
Dharma P. Agrawal is the Ohio Board of Regents Distinguished Professor and the founding director for the Center for Distributed and Mobile Computing in the Department of Electrical Engineering and Computing Systems. He has been a faculty member at the ECE Dept., Carnegie Mellon University (on sabbatical leave), N.C. State University, Raleigh and the Wayne State University. His current research interests include applications of sensor networks in monitoring Parkinson’s disease patients and neurosis, applications of sensor networks in monitoring fitness of athletes’ personnel wellness, applications of sensor networks in monitoring firefighters physical condition in action, efficient secured communication in Sensor networks, secured group communication in Vehicular Networks, use of Femto cells in LTE technology and interference issues, heterogeneous wireless networks, and resource allocation and security in mesh networks for 4G technology. He has been the Program Chair and General Chair for numerous international conferences and meetings.He has been named as an ISI Highly Cited Researcher, is a Fellow of the IEEE, the ACM, the AAAS and the World Innovation Foundation, and a recent recipient of 2008 IEEE CS Harry Goode Award.
Deepak Gupta received his Master of Science degree from Illinois Institute of Technology, Chicago, USA, in the area of Computer Forensics and Cyber Security with a specialization in Voice Over Internet Protocol (VOIP). As an undergraduate student, he became certified on the major networking platforms, first as a CCNA (Cisco Certified Network Administrator) and then as a MCP (Microsoft Certified Professional) which would come to serve him well in his professional life. As a graduate student, Deepak continued to challenge himself by working on a number of research papers and projects related to Computer Network Security and Forensics Research, including the topics of multi-boot computer systems with change of boot loader and MP3 steganography. He also developed and furthered his interest in VOIP technology by working on and leading research projects with Bell Labs, a prominent VOIP research lab based in Chicago. Deepak also wrote research papers in this field on the topics of P2P communication and SIP protocols which won him the best student VOIP project award in 2007.

Bibliografické údaje