Muutke küpsiste eelistusi

Advances in Cyber Security and Intelligent Analytics [Kõva köide]

Edited by (IIITDM Jabalpur, India), Edited by (IIIT ALLAHABAD), Edited by (National Institute of Technology Tiruchirappalli, India), Edited by (Aurel Vlaicu University of Arad, Romania), Edited by (ABES Institute of Technology, UP, India)
  • Formaat: Hardback, 292 pages, kõrgus x laius: 234x156 mm, kaal: 580 g, 33 Tables, black and white; 78 Line drawings, black and white; 7 Halftones, black and white; 85 Illustrations, black and white
  • Ilmumisaeg: 21-Dec-2022
  • Kirjastus: CRC Press
  • ISBN-10: 103221600X
  • ISBN-13: 9781032216003
  • Formaat: Hardback, 292 pages, kõrgus x laius: 234x156 mm, kaal: 580 g, 33 Tables, black and white; 78 Line drawings, black and white; 7 Halftones, black and white; 85 Illustrations, black and white
  • Ilmumisaeg: 21-Dec-2022
  • Kirjastus: CRC Press
  • ISBN-10: 103221600X
  • ISBN-13: 9781032216003
We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking modelsIoT, SDN, and ICNto support modern systems requirements. However, they are undergoing rapid changes and need special attention. The main issue faced by these paradigms is that traditional solutions cannot be directly applied to address the challenges. Therefore, there is a significant need to develop improved network management and cyber security solutions. To this end, this book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. More specifically, it presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.
Acknowledgements ix
Editors xi
Contributors xv
1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends
1(26)
Ravish Tomar
Sarishma Dangi
Sachin Sharma
2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
27(16)
Florian K. Kaiser
Marcus Wiens
Frank Schultmann
3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework
43(20)
D. Santhadevi
B. Janet
4 Exploring the possibility of blockchain and smart contract-based digital certificate
63(16)
P. Ravi Kumar
P. Herbert Raj
Sharul Tajuddin
5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range
79(26)
Niharika Singh
Ishu Gupta
Ashutosh Kumar Singh
6 Addressing the cybersecurity issues in cloud computing
105(10)
Shivanshu Oliyhan
Chandrashekhar Azad
7 Role of medical image encryption algorithms in cloud platform for teleradiology applications
115(14)
Siju John
S. N. Kumar
8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things
129(12)
Thulasi M. Santhi
M. C. Helen mary
9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues
141(10)
Anshu Devi
Ramesh Kait
Virender Ranga
10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents
151(38)
Mezzour Ghita
Benhadou Siham
Medromi Hicham
Griguer Hafid
11 A detailed cram on artificial intelligence industrial systems 4.0
189(18)
R. Dharanyadevi
R. Sri Saipriya
T. C. Adityaa
B. Senthilnayaki
M. Julie therese
a. Devi
K. Venkatalakshmi
12 Ensuring liveliness property in safety-critical systems
207(12)
Ankur Maurya
Sharad Nigam
Divya Kumar
13 Machine learning for intelligent analytics
219(16)
Jyoti Pokhariya
Pankaj Kumar Mishra
Jyoti Kandpal
14 Secure 3D route optimization of combat vehicles in war field using IoV
235(14)
Alok Nath Pandey
Piyush Agarwal
Sachin Sharma
15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis
249(12)
B. Dhanalakshmi
K. Selvakumar
L. Sai Ramesh
16 Containerization in cloud computing for OS-level virtualization
261(16)
Manoj Kumar Patra
Bibhudatta Sahoo
Ashok Kumar Turuk
17 An adaptive deep learning approach for stock price forecasting
277(12)
Reshma Mo
Jitendra Kumar
Abhishek Verma
Index 289
Abhishek Verma, Vrijendra Singh