Muutke küpsiste eelistusi

Security Analytics for the Internet of Everything [Pehme köide]

Edited by (International Islamic University Malaysia, Kuala Lumpur), Edited by , Edited by
  • Formaat: Paperback / softback, 274 pages, kõrgus x laius: 234x156 mm, kaal: 453 g
  • Ilmumisaeg: 29-Aug-2022
  • Kirjastus: CRC Press
  • ISBN-10: 1032400692
  • ISBN-13: 9781032400693
Teised raamatud teemal:
  • Formaat: Paperback / softback, 274 pages, kõrgus x laius: 234x156 mm, kaal: 453 g
  • Ilmumisaeg: 29-Aug-2022
  • Kirjastus: CRC Press
  • ISBN-10: 1032400692
  • ISBN-13: 9781032400693
Teised raamatud teemal:

Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included.

The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.



This book addresses security analytics for the Internet of Everything. It provides a big picture on the concepts, techniques, applications, and open research directions in this area. It also serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next generation cyber security.
Preface

Acknowledgments

Editors

Contributors

Section I EMERGING SECURITY TRENDS

1 Critical Analysis of Blockchain for Internet of Everything

BUSHRA HOSSAIN

2 IoT Blockchain Integration: A Security Perspective

KAZIM RIFAT ÖZYILMAZ AND ARDA YURDAKUL

3 An Overview of the Dark Web

SHAHRIN SADIK AND MOHIUDDIN AHMED

Section II CYBER GOVERNANCE

4 Cyber Security in the Public Sector: Awareness of Potential Risks among
Public Policy Executives

TAHMINA RASHID AND KHALID CHAUHAN

5 A Benefits Realization Approach to Cyber Security Projects Implementation
in Public Sector Organizations

MUNIR A. SAEED, TAHMINA RASHID, AND MOHIUDDIN AHMED

Section III ARTIFICIAL INTELLIGENCE IN CYBER SECURITY

6 An Investigation of Performance Analysis of Machine Learning-Based
Techniques for Network Anomaly Detection

KEVIN CHONG, MOHIUDDIN AHMED, AND SYED MOHAMMED SHAMSUL ISLAM

7 The Kernel-Based Online Anomaly Detection Algorithm: Detailed Derivation
and Development

SALVA DANESHGADEH, TAREM AHMED, AND AL-SAKIB KHAN PATHAN

8 Secure Addressing Protocols for Mobile Ad Hoc Networks

UTTAM GHOSH, PUSHPITA CHATTERJEE, RAJA DATTA, AL-SAKIB KHAN PATHAN, AND DANDA
B. RAWAT

Section IV CYBER CHALLENGES

9 Cryptographic Attacks, Impacts and Countermeasures

HAZAA AL FAHDI AND MOHIUDDIN AHMED

10 Cyber Security for Network of Things (NoTs) in Military Systems:
Challenges and Countermeasures

MUHAMMAD IMRAN MALIK, IAN NOEL McATEER, PETER HANNAY, AHMED IBRAHIM, ZUBAIR
BAIG, AND GUANGLOU ZHENG

Index
Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan