Listing 1 - 10 of 23 | << page >> |
Sort by
|
Choose an application
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
Computer crimes --- Big data. --- Investigation. --- Computer science. --- Forensic science. --- Computer security. --- Application software. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Forensic Science. --- Legal Aspects of Computing. --- Computer Appl. in Social and Behavioral Sciences. --- Data sets, Large --- Large data sets --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Data sets --- Forensic medicine. --- Computers --- Social sciences --- Data processing. --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Forensic sciences --- Medicine --- Medical laws and legislation --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cyberspace --- Protection --- Security measures --- Law and legislation --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Criminalistics --- Forensic science --- Science --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.
Big data --- Research --- Data sets, Large --- Large data sets --- Data sets --- Data protection. --- Information systems. --- Artificial intelligence. --- Security. --- Information Systems and Communication Service. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace
Choose an application
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.
Data protection. --- Computer organization. --- Artificial intelligence. --- Computers. --- Security. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence. --- Information Systems and Communication Service. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Organization, Computer --- Electronic digital computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Big data --- Security measures. --- Data sets, Large --- Large data sets --- Data sets --- Seguretat informàtica --- Dades massives --- Protecció de dades --- Intel·ligència artificial --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Xifratge (Informàtica) --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Macrodades --- Bases de dades --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Pirates informàtics
Choose an application
Computer security. --- Big data. --- Data sets, Large --- Large data sets --- Data sets --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
Social sciences (general) --- Demography --- Legal medicine --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- gerechtelijk onderzoek --- analytische chemie --- big data --- biochemie --- informatica --- sociale wetenschappen --- informatiesystemen --- gerechtelijke geneeskunde --- computerbeveiliging --- computercriminaliteit --- Computer security. --- Application software. --- Forensic science. --- Computers. --- Law and legislation. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Forensic Science. --- Legal Aspects of Computing. --- Computer Appl. in Social and Behavioral Sciences.
Choose an application
This book constitutes the proceedings of the 17th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2017, held in Helsinki, Finland, in August 2017. The 25 full papers presented were carefully reviewed and selected from 117 submissions. They cover topics such as parallel and distributed architectures; software systems and programming models; distributed and network-based computing; big data and its applications; parallel and distributed algorithms; applications of parallel and distributed computing; service dependability and security in distributed and parallel systems; service dependability and security in distributed and parallel systems; performance modeling and evaluation. This volume also includes 41 papers of four workshops, namely: the 4th International Workshop on Data, Text, Web, and Social Network Mining (DTWSM 2017), the 5th International Workshop on Parallelism in Bioinformatics (PBio 2017) , the First International Workshop on Distributed Autonomous Computing in Smart City (DACSC 2017), and the Second International Workshop on Ultrascale Computing for Early Researchers (UCER 2017). .
Computer science. --- Computer communication systems. --- Software engineering. --- Algorithms. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Software Engineering. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Algorism --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Algebra --- Arithmetic --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Foundations --- Distributed processing --- Computer software. --- Software, Computer --- Computer systems --- Parallel processing (Electronic computers) --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computer and Information Systems Applications.
Choose an application
This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.
Engineering. --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Intelligence, Computational --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Construction --- Artificial intelligence --- Soft computing --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Industrial arts --- Technology --- Computer security --- Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Artificial Intelligence.
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Artificial intelligence. --- Computer Science. --- Security. --- Systems and Data Security. --- Information Systems and Communication Service. --- Computer Systems Organization and Communication Networks. --- Data Encryption. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Cybernetics --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Data protection. --- Information systems. --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer science
Choose an application
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications SCS 2017: The Third International Symposium on Sensor-Cloud Systems WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity .
Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Artificial intelligence. --- Computer Science. --- Security. --- Systems and Data Security. --- Information Systems and Communication Service. --- Data Encryption. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Cybernetics --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Data protection. --- Information systems. --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
These proceedings gather papers presented at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, and report on the latest advances in areas ranging from software security to cyber attack detection and modeling; the use of machine learning in cyber security; legislation and policy; surveying small businesses; cyber competition, and so on. Understanding the latest capabilities in cyber security is the best way to prepare users and organizations for potential negative events. Consequently, this book will be of interest to cyber security researchers, educators and practitioners, as well as students who want to learn about cyber security. .
Engineering—Data processing. --- Computational intelligence. --- Artificial intelligence. --- Data Engineering. --- Computational Intelligence. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Computer security
Listing 1 - 10 of 23 | << page >> |
Sort by
|