Preface |
|
xiii | |
Acknowledgments |
|
xix | |
|
1 The Rise of the Smart City |
|
|
1 | (30) |
|
|
1 | (1) |
|
|
2 | (4) |
|
The Democracy of Technology |
|
|
6 | (2) |
|
|
8 | (1) |
|
The Rise of Nanotechnology and Artificial Intelligence |
|
|
9 | (1) |
|
|
10 | (2) |
|
The Need for Operations Research and Urban Informatics |
|
|
12 | (1) |
|
The Bumpy Road to the Smart City |
|
|
13 | (3) |
|
Shopping for a Smart City Simulator |
|
|
16 | (3) |
|
The New Science of Cities: Urban Informatics |
|
|
19 | (3) |
|
Reality Drivers of the Smart City |
|
|
22 | (2) |
|
Introducing Smart City Value Chain |
|
|
24 | (2) |
|
|
26 | (4) |
|
|
30 | (1) |
|
2 Challenges of the Smart City |
|
|
31 | (32) |
|
|
31 | (2) |
|
The Four Challenges of Smart Cities |
|
|
33 | (16) |
|
First: The Human Challenge |
|
|
33 | (1) |
|
Smart Cities and Eradication of Poverty |
|
|
33 | (2) |
|
Second: The Technological Challenge |
|
|
35 | (1) |
|
Smart Cities and Eradication of Cybercrime |
|
|
36 | (3) |
|
Internet's Compatibility Iceberg |
|
|
39 | (1) |
|
The Aging Antivirus Technologies |
|
|
39 | (2) |
|
Cybersecurity, the Technological Divide |
|
|
41 | (1) |
|
Digital Immunity: The New Miraculous Paradigm |
|
|
42 | (1) |
|
Recipe for Digital Immunity |
|
|
42 | (1) |
|
We Call It Digital Immunity |
|
|
43 | (2) |
|
Third: The Environmental Challenge |
|
|
45 | (2) |
|
Fourth: The Urban Commons Challenge |
|
|
47 | (2) |
|
All Cities Are Smart, Not Dumb Cities |
|
|
49 | (1) |
|
Vendors Interoperability Challenge |
|
|
50 | (1) |
|
The Kurzweil Future Vision |
|
|
51 | (1) |
|
The UN Appeal for the Smart City |
|
|
52 | (1) |
|
The Himalayas K2 Challenge |
|
|
53 | (1) |
|
|
53 | (3) |
|
Urbanization Is a Blessing or Curse |
|
|
56 | (1) |
|
|
57 | (3) |
|
|
60 | (1) |
|
|
61 | (2) |
|
3 Critical Success Factors of Smart Cities |
|
|
63 | (28) |
|
|
63 | (1) |
|
Anatomy of the Smart City |
|
|
64 | (1) |
|
Microsoft's Zero-Day Cavity |
|
|
64 | (2) |
|
Why Do We Need Critical Success Factors? |
|
|
66 | (1) |
|
Criticality and Infrastructure Relationship |
|
|
66 | (2) |
|
Criticality of Reinforced Column |
|
|
67 | (1) |
|
|
68 | (2) |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (2) |
|
The Power Grid Is City's Holy Grail |
|
|
74 | (1) |
|
A Smart City Needs a Digital Cockpit |
|
|
75 | (5) |
|
The Generalized Uncertainty Principle |
|
|
80 | (1) |
|
The CSF and KPI, the Twin Brothers |
|
|
81 | (1) |
|
Smart Cities Are Made of Interdependent Structures |
|
|
82 | (4) |
|
Critical Success Factors Value Chain |
|
|
86 | (1) |
|
Matching Smart City Critical Issues with Best Solutions |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (2) |
|
4 The Flat Tire of Antivirus Technologies |
|
|
91 | (48) |
|
|
91 | (1) |
|
The Hardware Acceleration |
|
|
92 | (3) |
|
|
92 | (3) |
|
|
95 | (1) |
|
Quality of Life in the Smart City |
|
|
96 | (1) |
|
AVT Meets the City's Smart Grid |
|
|
97 | (1) |
|
|
97 | (1) |
|
Endpoint Protection Evaluation I |
|
|
98 | (2) |
|
More AVT Flat Tire Stories |
|
|
100 | (2) |
|
Smart Grids Need Smart Solutions |
|
|
102 | (1) |
|
Endpoint Protection Evaluation II |
|
|
102 | (2) |
|
|
104 | (2) |
|
Merger & Acquisition Technology |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (2) |
|
|
110 | (1) |
|
Hacking Psychological Profiling |
|
|
111 | (5) |
|
|
116 | (1) |
|
Auditing the Hacker's Mind |
|
|
117 | (1) |
|
Digital Immunity: The Holy Grail |
|
|
117 | (2) |
|
Theory of Reasoned Action |
|
|
119 | (2) |
|
|
121 | (1) |
|
Digital Immunity, the Holy Grail of Cybersecurity |
|
|
122 | (1) |
|
AVT Software Is the Hijacker! |
|
|
123 | (2) |
|
|
125 | (1) |
|
|
126 | (9) |
|
|
135 | (4) |
|
5 DDoS Malware: The Curse of Virus Rain™ |
|
|
139 | (28) |
|
|
139 | (1) |
|
|
139 | (5) |
|
Queuing Theory Is Future Visioning |
|
|
144 | (1) |
|
DDoS Attack Forecast and Mitigation Mathematical Performance Equations |
|
|
145 | (1) |
|
Basic Queuing Theory Formulas |
|
|
145 | (1) |
|
M/D/1 Case (Random Arrival, Deterministic Service, and One Server) |
|
|
145 | (1) |
|
M/M/1 Case (Random Arrival, Random Service, and One Server) |
|
|
146 | (1) |
|
M/M/C Case (Markovian, Random Service, and C Servers) |
|
|
146 | (2) |
|
|
148 | (1) |
|
Conquest against the DDoS Regime |
|
|
148 | (2) |
|
DDoS Codification and Cataloguing |
|
|
150 | (1) |
|
The Five Protocols of a DoS Attack |
|
|
151 | (1) |
|
DDoS Needs Planning and Knowledge |
|
|
152 | (1) |
|
Organized Crime in Cyberspace |
|
|
152 | (4) |
|
|
156 | (1) |
|
Hacker and Data Guardians |
|
|
157 | (1) |
|
|
158 | (7) |
|
|
165 | (2) |
|
6 The Three Generations of DDoS |
|
|
167 | (36) |
|
Kurzweil's Accelerating Intelligence |
|
|
167 | (2) |
|
The Three Generations of DDoS |
|
|
169 | (1) |
|
Evolution and Generation of DDoS |
|
|
169 | (21) |
|
The Law of Accelerating Returns |
|
|
169 | (1) |
|
First-Generation Gl DDoS: Internet Vandalism |
|
|
169 | (3) |
|
The Second-Generation G2 DDoS |
|
|
172 | (1) |
|
The Dawn of G2 DDoS Attacks |
|
|
173 | (1) |
|
Smart City Fight against G2 DDoS |
|
|
174 | (2) |
|
List of Intelligent Assaults |
|
|
176 | (14) |
|
|
190 | (4) |
|
Getting Ready for the Big Malware Attacks |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (3) |
|
Electromagnetic Pulse Attack |
|
|
195 | (2) |
|
Washington Doesn't Understand the Internet |
|
|
197 | (1) |
|
The Second-Generation Digital Native |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
200 | (3) |
|
7 Software Cyborgs of Tomorrow |
|
|
203 | (42) |
|
Shaking Hands with Cybernetics |
|
|
203 | (2) |
|
|
205 | (4) |
|
Description of the Anatomy of the Soft Cyborg: Nanobot |
|
|
205 | (2) |
|
The Soft Cyborg: Nanobot, Continued |
|
|
207 | (2) |
|
Soft Cyborg Knowledge Engines |
|
|
209 | (2) |
|
Soft Cyborg Satellite and Web Communication |
|
|
211 | (1) |
|
Components of the Satellite Infrastructures |
|
|
212 | (1) |
|
Summary of the Internet/Satellite Transactional Services and Messages |
|
|
213 | (1) |
|
|
214 | (1) |
|
Nanobot Is the Rosetta Stone |
|
|
214 | (1) |
|
Nanotechnology in Medicine |
|
|
215 | (1) |
|
Scenario of Soft Cyborg Attack on Beirut, Lebanon |
|
|
216 | (5) |
|
|
221 | (23) |
|
|
244 | (1) |
|
8 The Amazing Architecture of the Human Immune System |
|
|
245 | (34) |
|
|
245 | (1) |
|
The Anatomy of the Futuristic Human Body |
|
|
246 | (1) |
|
|
247 | (1) |
|
The 12 Biological Autonomic Systems |
|
|
248 | (13) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
250 | (2) |
|
Anatomy of the Biological Nanobots |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (2) |
|
|
256 | (1) |
|
8 The Reproductive System |
|
|
257 | (1) |
|
|
258 | (1) |
|
10 The Respiratory System |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
The Vital Organs of Survival |
|
|
261 | (1) |
|
|
262 | (3) |
|
|
265 | (2) |
|
Uploading the Brain to a Computer |
|
|
267 | (3) |
|
The Superintelligent Human |
|
|
270 | (1) |
|
The Concept of Singularity |
|
|
270 | (4) |
|
1 Technologies to Support Smart Cities and Their Infrastructure |
|
|
271 | (1) |
|
2 Technologies That Will Promote Human Superintelligence for Smart City Citizens |
|
|
272 | (1) |
|
3 Technologies That Support the Quality of Life of Citizens in Smart Cities |
|
|
272 | (2) |
|
Smart City Quality of Life (QOL) Indicators |
|
|
274 | (1) |
|
The Magic of Superintelligent Digital Immunity |
|
|
274 | (1) |
|
Glossary of Human Anatomy |
|
|
275 | (2) |
|
|
277 | (2) |
|
9 The Miraculous Anatomy of the Digital Immune System |
|
|
279 | (42) |
|
|
279 | (2) |
|
Smart Cities Are Like the Human Body |
|
|
281 | (3) |
|
CEWPS is the Electronic Shield of the Smart City |
|
|
284 | (1) |
|
The 3D Nano Attack Scenario |
|
|
285 | (2) |
|
Anatomy of CEWPS and Its Intelligent Components |
|
|
287 | (1) |
|
Anatomical Composition of Digital Immunity (DI) |
|
|
287 | (19) |
|
CEWPS Component 1 The Central Coordination Center (CCC) |
|
|
287 | (1) |
|
CEWPS Component 2 The Knowledge Acquisition Component |
|
|
287 | (3) |
|
|
290 | (1) |
|
|
290 | (1) |
|
The Six Stages of a Cybercrime Episode |
|
|
291 | (1) |
|
Cybercrime Raw Data Distillation Process |
|
|
292 | (2) |
|
CEWPS Component 3 The Reasoning Engine |
|
|
294 | (1) |
|
|
294 | (2) |
|
|
296 | (1) |
|
We Can Forecast Weather---Why Can't We Predict Crime? |
|
|
297 | (1) |
|
Anatomy of the Causality Reasoning Engine |
|
|
297 | (1) |
|
CEWPS Component 4 Reverse Engineering Center |
|
|
297 | (2) |
|
CEWPS Component 5 Smart City Critical Infrastructure (SCCI) |
|
|
299 | (1) |
|
|
300 | (1) |
|
What Is a Critical Infrastructure? |
|
|
301 | (2) |
|
CEWPS Component 6 The Smart Vaccine Center (SVC) |
|
|
303 | (1) |
|
CEWPS Component 7 The VaKB |
|
|
304 | (1) |
|
CEWPS Component 8 The ViKB |
|
|
304 | (1) |
|
CEWPS Component 9 CEWPS Smart Nanogrid |
|
|
305 | (1) |
|
|
306 | (1) |
|
Connectivity of Critical Systems to City's Smart Nanogrid |
|
|
306 | (1) |
|
Anatomy of the Autonomic Adapter |
|
|
306 | (2) |
|
The Smart City Is Idealistic Hype |
|
|
308 | (2) |
|
|
310 | (1) |
|
|
310 | (10) |
|
|
320 | (1) |
|
10 Unique Features in Digital Immunity Infrastructure |
|
|
321 | (32) |
|
|
321 | (1) |
|
Symbiotic Relation between Science and Technology |
|
|
322 | (1) |
|
Building Blocks of Digital Immunity Infrastructure |
|
|
322 | (3) |
|
Technology 1 Human Intelligence (The Thinking Machine) |
|
|
325 | (1) |
|
Technology 2 Nanotechnology: SVN |
|
|
325 | (1) |
|
Sequence of Battle between Soft Cyborgs and SVN |
|
|
326 | (1) |
|
|
326 | (8) |
|
Category 1 The Home Area Nano Network (HANN) |
|
|
328 | (2) |
|
Category 2 HealthCare Wearable Nanodevice Network (H2M) |
|
|
330 | (1) |
|
Category 3 Machine-to-Machine (M2M) |
|
|
330 | (4) |
|
Technology 3 Artificial Intelligence, the Ultra-Intelligent Machine |
|
|
334 | (1) |
|
Building the Digital Immunity (DI) Infrastructure |
|
|
335 | (1) |
|
Anatomy of Digital Immunity (DI)'s Main Components |
|
|
336 | (1) |
|
The Amazing Reality of the Nanobot |
|
|
336 | (4) |
|
|
340 | (11) |
|
|
351 | (2) |
|
11 The Ingenious Engineering of the Smart Grid |
|
|
353 | (26) |
|
|
353 | (1) |
|
A Brief History of the Grid |
|
|
353 | (1) |
|
It All Started with the Power Grid |
|
|
354 | (1) |
|
Anatomy of the Human Grid |
|
|
355 | (1) |
|
Smart Design Characteristics of the Human Grids |
|
|
355 | (2) |
|
|
357 | (2) |
|
The Grid Magnified Million Times |
|
|
359 | (1) |
|
Modern Nano Warfare in a Smart City |
|
|
359 | (8) |
|
Scenario 1 Attackers Penetrate the City Grid, but Cannot Reach the Targets |
|
|
362 | (1) |
|
Scenario 2 Attackers Penetrate the City Grid and Are Ready to Compromise the Targets |
|
|
363 | (3) |
|
Scenario 3 Attackers Are Going After the City's Power Grid |
|
|
366 | (1) |
|
Internet of NanoThings (IoNT) Connectivity |
|
|
367 | (1) |
|
Scenario 4 Attackers Are Going After the City's Partial Power Grid |
|
|
368 | (1) |
|
The IoT Autonomic Adapter |
|
|
368 | (3) |
|
Organizational Chart of the Smart Vaccine Nano Army |
|
|
371 | (2) |
|
A Real-Time Screen of the CEWPS during an Attack |
|
|
373 | (1) |
|
|
374 | (4) |
|
|
378 | (1) |
|
12 Defense Strategies of Smart Cities: Smart Defense by Smart Offense |
|
|
379 | (30) |
|
|
379 | (1) |
|
Department of Homeland Risk Lexicon |
|
|
380 | (1) |
|
The Need for Numerical Metrics |
|
|
381 | (1) |
|
|
382 | (1) |
|
The Rise of the Nano Machine: AI, the Future of Cybersecurity |
|
|
383 | (1) |
|
Kurzweil's Singularity as Transcendence |
|
|
384 | (2) |
|
AVT, the Achilles of Cybersecurity |
|
|
386 | (2) |
|
Postulates of Digital Immunity Infrastructure (DI) |
|
|
388 | (1) |
|
The Rationale of Defense by Offense |
|
|
388 | (4) |
|
Structure of the Smart Nanogrid |
|
|
392 | (1) |
|
Deployment Strategy of Smart City Nano Defense |
|
|
393 | (3) |
|
How to Build the Nano Smart Grid |
|
|
396 | (1) |
|
Blueprint of the Design of Digital Immunity Infrastructure |
|
|
396 | (2) |
|
Why Do We Need a Blueprint for Defense Strategy? |
|
|
398 | (1) |
|
Building a Robust Nano Defense for a Smart City |
|
|
399 | (1) |
|
|
400 | (7) |
|
|
407 | (2) |
|
13 Cyber Terrorism Launched against Smart Cities |
|
|
409 | (34) |
|
|
409 | (1) |
|
Perspectives of Nano Technology |
|
|
410 | (1) |
|
|
411 | (1) |
|
Anatomy of Cyber Terrorism |
|
|
412 | (1) |
|
Cyber Terrorism Attraction to Smart Cities |
|
|
413 | (3) |
|
How Do Cyber Terrorists Plan an Attack? |
|
|
413 | (1) |
|
How Can We Quantitatively Measure the Success of a Cyberattack? |
|
|
413 | (2) |
|
What Is the Planning Cycle for a Cyberattack? |
|
|
415 | (1) |
|
The Futuristic Architecture of Nano Digital Immunity |
|
|
416 | (2) |
|
Attack Scenario of the Virus Nano Rain™ |
|
|
418 | (3) |
|
|
421 | (1) |
|
Cyber Terrorism Shifting to High Gear |
|
|
422 | (2) |
|
How Long Will It Take a City to Become a Smart City? |
|
|
424 | (1) |
|
|
425 | (17) |
|
|
442 | (1) |
|
14 Epilogue: Where Are We Headed with the Cyber Nightmare? |
|
|
443 | (23) |
|
Which Is the Most Powerful Army in the World? |
|
|
443 | (1) |
|
|
444 | (1) |
|
The Cyber Terrorism Armies, Enlisted in the Hall of Infamy |
|
|
445 | (10) |
|
1 The Islamic State of Iraq and Syria (ISIS) |
|
|
445 | (3) |
|
2 The Russian Cyber Army (ATP28) |
|
|
448 | (1) |
|
3 The Syrian Electronic Army |
|
|
448 | (4) |
|
|
452 | (1) |
|
5 North Korean Cyber Army |
|
|
453 | (1) |
|
|
453 | (2) |
|
What Drives a Country to Develop a Cyber Army? |
|
|
455 | (1) |
|
The Dream Cyberattacks for the Cyber Armies of the World |
|
|
456 | (2) |
|
Crystal-Balling Nano Cyber Terrorism in the Future |
|
|
458 | (2) |
|
|
458 | (1) |
|
|
459 | (1) |
|
The New Dawn for Cybersecurity |
|
|
460 | (1) |
|
Molecular Warfare to Defend Smart Cities |
|
|
460 | (6) |
|
|
461 | (5) |
Glossary |
|
466 | (12) |
Bibliography |
|
478 | (3) |
Appendix |
|
481 | (2) |
Index |
|
483 | |