Advanced Security Strategies in Next Generation Computing Models

Advanced Security Strategies in Next Generation Computing Models

Author: Shafi'i Muhammad Abdulhamid

Publisher: Information Science Reference

Published: 2020

Total Pages: 300

ISBN-13: 9781799850809

DOWNLOAD EBOOK

"This book is a collection of innovative research on the methods and development of innovative computing technologies and their involvement in improving modern security approaches"--


Book Synopsis Advanced Security Strategies in Next Generation Computing Models by : Shafi'i Muhammad Abdulhamid

Download or read book Advanced Security Strategies in Next Generation Computing Models written by Shafi'i Muhammad Abdulhamid and published by Information Science Reference. This book was released on 2020 with total page 300 pages. Available in PDF, EPUB and Kindle. Book excerpt: "This book is a collection of innovative research on the methods and development of innovative computing technologies and their involvement in improving modern security approaches"--


Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks

Author: Sagayam, K. Martin

Publisher: IGI Global

Published: 2020-06-12

Total Pages: 405

ISBN-13: 1799850692

DOWNLOAD EBOOK

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.


Book Synopsis Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks by : Sagayam, K. Martin

Download or read book Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks written by Sagayam, K. Martin and published by IGI Global. This book was released on 2020-06-12 with total page 405 pages. Available in PDF, EPUB and Kindle. Book excerpt: Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.


Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems

Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems

Author: Yastrebenetsky, Michael A.

Publisher: IGI Global

Published: 2020-05-22

Total Pages: 501

ISBN-13: 1799832791

DOWNLOAD EBOOK

Safety and security are crucial to the operations of nuclear power plants, but cyber threats to these facilities are increasing significantly. Instrumentation and control systems, which play a vital role in the prevention of these incidents, have seen major design modifications with the implementation of digital technologies. Advanced computing systems are assisting in the protection and safety of nuclear power plants; however, significant research on these computational methods is deficient. Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems is a pivotal reference source that provides vital research on the digital developments of instrumentation and control systems for assuring the safety and security of nuclear power plants. While highlighting topics such as accident monitoring systems, classification measures, and UAV fleets, this publication explores individual cases of security breaches as well as future methods of practice. This book is ideally designed for engineers, industry specialists, researchers, policymakers, scientists, academicians, practitioners, and students involved in the development and operation of instrumentation and control systems for nuclear power plants, chemical and petrochemical industries, transport, and medical equipment.


Book Synopsis Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems by : Yastrebenetsky, Michael A.

Download or read book Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems written by Yastrebenetsky, Michael A. and published by IGI Global. This book was released on 2020-05-22 with total page 501 pages. Available in PDF, EPUB and Kindle. Book excerpt: Safety and security are crucial to the operations of nuclear power plants, but cyber threats to these facilities are increasing significantly. Instrumentation and control systems, which play a vital role in the prevention of these incidents, have seen major design modifications with the implementation of digital technologies. Advanced computing systems are assisting in the protection and safety of nuclear power plants; however, significant research on these computational methods is deficient. Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems is a pivotal reference source that provides vital research on the digital developments of instrumentation and control systems for assuring the safety and security of nuclear power plants. While highlighting topics such as accident monitoring systems, classification measures, and UAV fleets, this publication explores individual cases of security breaches as well as future methods of practice. This book is ideally designed for engineers, industry specialists, researchers, policymakers, scientists, academicians, practitioners, and students involved in the development and operation of instrumentation and control systems for nuclear power plants, chemical and petrochemical industries, transport, and medical equipment.


Applied Approach to Privacy and Security for the Internet of Things

Applied Approach to Privacy and Security for the Internet of Things

Author: Chatterjee, Parag

Publisher: IGI Global

Published: 2020-06-26

Total Pages: 295

ISBN-13: 1799824462

DOWNLOAD EBOOK

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.


Book Synopsis Applied Approach to Privacy and Security for the Internet of Things by : Chatterjee, Parag

Download or read book Applied Approach to Privacy and Security for the Internet of Things written by Chatterjee, Parag and published by IGI Global. This book was released on 2020-06-26 with total page 295 pages. Available in PDF, EPUB and Kindle. Book excerpt: From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.


Emerging Trends in ICT for Sustainable Development

Emerging Trends in ICT for Sustainable Development

Author: Mohamed Ben Ahmed

Publisher: Springer Nature

Published: 2021-01-23

Total Pages: 406

ISBN-13: 3030534405

DOWNLOAD EBOOK

This book features original research and recent advances in ICT fields related to sustainable development. Based the International Conference on Networks, Intelligent systems, Computing & Environmental Informatics for Sustainable Development, held in Marrakech in April 2020, it features peer-reviewed chapters authored by prominent researchers from around the globe. As such it is an invaluable resource for courses in computer science, electrical engineering and urban sciences for sustainable development. This book covered topics including • Green Networks • Artificial Intelligence for Sustainability• Environment Informatics• Computing Technologies


Book Synopsis Emerging Trends in ICT for Sustainable Development by : Mohamed Ben Ahmed

Download or read book Emerging Trends in ICT for Sustainable Development written by Mohamed Ben Ahmed and published by Springer Nature. This book was released on 2021-01-23 with total page 406 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book features original research and recent advances in ICT fields related to sustainable development. Based the International Conference on Networks, Intelligent systems, Computing & Environmental Informatics for Sustainable Development, held in Marrakech in April 2020, it features peer-reviewed chapters authored by prominent researchers from around the globe. As such it is an invaluable resource for courses in computer science, electrical engineering and urban sciences for sustainable development. This book covered topics including • Green Networks • Artificial Intelligence for Sustainability• Environment Informatics• Computing Technologies


Next-Generation Enterprise Security and Governance

Next-Generation Enterprise Security and Governance

Author: Mohiuddin Ahmed

Publisher: CRC Press

Published: 2022-04-19

Total Pages: 172

ISBN-13: 1000569799

DOWNLOAD EBOOK

The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.


Book Synopsis Next-Generation Enterprise Security and Governance by : Mohiuddin Ahmed

Download or read book Next-Generation Enterprise Security and Governance written by Mohiuddin Ahmed and published by CRC Press. This book was released on 2022-04-19 with total page 172 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.


Cyber Security for Next-Generation Computing Technologies

Cyber Security for Next-Generation Computing Technologies

Author: Inam Ullah Khan

Publisher: CRC Press

Published: 2024-01-16

Total Pages: 328

ISBN-13: 1003826407

DOWNLOAD EBOOK

This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. KEY FEATURES Highlights innovative principles and practices using next generation computing technologies based cybersecurity Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity Offers an overview of theoretical, practical, simulation concepts of cybersecurity


Book Synopsis Cyber Security for Next-Generation Computing Technologies by : Inam Ullah Khan

Download or read book Cyber Security for Next-Generation Computing Technologies written by Inam Ullah Khan and published by CRC Press. This book was released on 2024-01-16 with total page 328 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. KEY FEATURES Highlights innovative principles and practices using next generation computing technologies based cybersecurity Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity Offers an overview of theoretical, practical, simulation concepts of cybersecurity


Cloud Security

Cloud Security

Author: Sirisha Potluri

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2021-07-19

Total Pages: 253

ISBN-13: 311073270X

DOWNLOAD EBOOK

This book presents research on the state-of-the-art methods and applications. Security and privacy related issues of cloud are addressed with best practices and approaches for secure cloud computing, such as cloud ontology, blockchain, recommender s


Book Synopsis Cloud Security by : Sirisha Potluri

Download or read book Cloud Security written by Sirisha Potluri and published by Walter de Gruyter GmbH & Co KG. This book was released on 2021-07-19 with total page 253 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents research on the state-of-the-art methods and applications. Security and privacy related issues of cloud are addressed with best practices and approaches for secure cloud computing, such as cloud ontology, blockchain, recommender s


Cognitive Engineering for Next Generation Computing

Cognitive Engineering for Next Generation Computing

Author: Kolla Bhanu Prakash

Publisher: John Wiley & Sons

Published: 2021-03-19

Total Pages: 368

ISBN-13: 1119711282

DOWNLOAD EBOOK

The cognitive approach to the IoT provides connectivity to everyone and everything since IoT connected devices are known to increase rapidly. When the IoT is integrated with cognitive technology, performance is improved, and smart intelligence is obtained. Discussed in this book are different types of datasets with structured content based on cognitive systems. The IoT gathers the information from the real time datasets through the internet, where the IoT network connects with multiple devices. This book mainly concentrates on providing the best solutions to existing real-time issues in the cognitive domain. Healthcare-based, cloud-based and smart transportation-based applications in the cognitive domain are addressed. The data integrity and security aspects of the cognitive computing main are also thoroughly discussed along with validated results.


Book Synopsis Cognitive Engineering for Next Generation Computing by : Kolla Bhanu Prakash

Download or read book Cognitive Engineering for Next Generation Computing written by Kolla Bhanu Prakash and published by John Wiley & Sons. This book was released on 2021-03-19 with total page 368 pages. Available in PDF, EPUB and Kindle. Book excerpt: The cognitive approach to the IoT provides connectivity to everyone and everything since IoT connected devices are known to increase rapidly. When the IoT is integrated with cognitive technology, performance is improved, and smart intelligence is obtained. Discussed in this book are different types of datasets with structured content based on cognitive systems. The IoT gathers the information from the real time datasets through the internet, where the IoT network connects with multiple devices. This book mainly concentrates on providing the best solutions to existing real-time issues in the cognitive domain. Healthcare-based, cloud-based and smart transportation-based applications in the cognitive domain are addressed. The data integrity and security aspects of the cognitive computing main are also thoroughly discussed along with validated results.


Point-of-Care Technologies Enabling Next-Generation Healthcare Monitoring and Management

Point-of-Care Technologies Enabling Next-Generation Healthcare Monitoring and Management

Author: Sandeep Kumar Vashist

Publisher: Springer

Published: 2019-02-20

Total Pages: 232

ISBN-13: 3030114163

DOWNLOAD EBOOK

This book describes the emerging point-of-care (POC) technologies that are paving the way to the next generation healthcare monitoring and management. It provides the readers with comprehensive, up-to-date information about the emerging technologies, such as smartphone-based mobile healthcare technologies, smart devices, commercial personalized POC technologies, paper-based immunoassays (IAs), lab-on-a-chip (LOC)-based IAs, and multiplex IAs. The book also provides guided insights into the POC diabetes management software and smart applications, and the statistical determination of various bioanalytical parameters. Additionally, the authors discuss the future trends in POC technologies and personalized and integrated healthcare solutions for chronic diseases, such as diabetes, stress, obesity, and cardiovascular disorders. Each POC technology is described comprehensively and analyzed critically with its characteristic features, bioanalytical principles, applications, advantages, limitations, and future trends. This book would be a very useful resource and teaching aid for professionals working in the field of POC technologies, in vitro diagnostics (IVD), mobile healthcare, Big Data, smart technology, software, smart applications, biomedical engineering, biosensors, personalized healthcare, and other disciplines.


Book Synopsis Point-of-Care Technologies Enabling Next-Generation Healthcare Monitoring and Management by : Sandeep Kumar Vashist

Download or read book Point-of-Care Technologies Enabling Next-Generation Healthcare Monitoring and Management written by Sandeep Kumar Vashist and published by Springer. This book was released on 2019-02-20 with total page 232 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book describes the emerging point-of-care (POC) technologies that are paving the way to the next generation healthcare monitoring and management. It provides the readers with comprehensive, up-to-date information about the emerging technologies, such as smartphone-based mobile healthcare technologies, smart devices, commercial personalized POC technologies, paper-based immunoassays (IAs), lab-on-a-chip (LOC)-based IAs, and multiplex IAs. The book also provides guided insights into the POC diabetes management software and smart applications, and the statistical determination of various bioanalytical parameters. Additionally, the authors discuss the future trends in POC technologies and personalized and integrated healthcare solutions for chronic diseases, such as diabetes, stress, obesity, and cardiovascular disorders. Each POC technology is described comprehensively and analyzed critically with its characteristic features, bioanalytical principles, applications, advantages, limitations, and future trends. This book would be a very useful resource and teaching aid for professionals working in the field of POC technologies, in vitro diagnostics (IVD), mobile healthcare, Big Data, smart technology, software, smart applications, biomedical engineering, biosensors, personalized healthcare, and other disciplines.