Listing 1 - 10 of 16 | << page >> |
Sort by
|
Choose an application
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.
Big data --- Research --- Data sets, Large --- Large data sets --- Data sets --- Data protection. --- Information systems. --- Artificial intelligence. --- Security. --- Information Systems and Communication Service. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace
Choose an application
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.
Production management --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- veiligheid (mensen) --- cloud computing --- IoT (Internet of Things) --- big data --- informatiesystemen --- computerbeveiliging --- KI (kunstmatige intelligentie)
Choose an application
This book constitutes the refereed proceedings of the 16th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN 2019, held in Naples, Italy, in September 2019. The 32 full papers and 8 short papers were carefully reviewed and selected from 89 submissions. The papers focus on all aspects of: big data analytics & machine learning; cyber security; cloud fog & edge computing; communication solutions; high performance computing and applications; consumer cyber security; and vehicular technology.
Computers --- Application software --- Access control. --- Development. --- Development of application software --- Computer security --- Application software. --- Computers. --- Computer organization. --- Optical data processing. --- Artificial intelligence. --- Computer Applications. --- Information Systems and Communication Service. --- Computer Systems Organization and Communication Networks. --- Image Processing and Computer Vision. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Optical computing --- Visual data processing --- Integrated optics --- Photonics --- Organization, Computer --- Electronic digital computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Optical equipment
Choose an application
Production management --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- veiligheid (mensen) --- cloud computing --- IoT (Internet of Things) --- big data --- informatiesystemen --- computerbeveiliging --- KI (kunstmatige intelligentie)
Choose an application
The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cyber Intelligence-related methods, which are frequently used in the context of city management and services.
Computer security --- Computer crimes --- Engineering. --- Artificial intelligence. --- Computational Intelligence. --- Artificial Intelligence. --- Construction --- Industrial arts --- Technology --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing
Choose an application
This book presents the combined proceedings of the 12th International Conference on Multimedia and Ubiquitous Engineering (MUE 2018) and the 13th International Conference on Future Information Technology (Future Tech 2018), both held in Salerno, Italy, April 23 - 25, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.
Information technology --- Ubiquitous computing --- Multimedia systems --- Telecommunication. --- Engineering. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Computational Intelligence. --- Construction --- Industrial arts --- Technology --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Smart City and Informatization, iSCI 2019, held in Guangzhou, China, in November 2019. The volume presents 52 full papers, which were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on Internet of Things (IoT) and smart sensing; urban computing and big data; smart society informatization technologies; cloud/edge/fog computing for smart city; applications for smart city informatization; assistive engineering and information technology; cyberspace security; blockchain and applications. .
Computer communication systems. --- Architecture, Computer. --- Computer security. --- Artificial intelligence. --- Application software. --- Computer Communication Networks. --- Computer System Implementation. --- Systems and Data Security. --- Artificial Intelligence. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Protection --- Security measures --- Distributed processing --- Computer networks. --- Computer architecture.
Choose an application
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.
Telecommunication systems --- Computer networks --- Security measures --- Computer security. --- Computer organization. --- Computers. --- Application software. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Organization, Computer --- Electronic digital computers --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.
Telecommunication systems --- Computer networks --- Security measures --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer security. --- Computer organization. --- Computers. --- Application software. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Organization, Computer --- Electronic digital computers --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Telecommunication technology --- Applied physical engineering --- Mass communications --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- neuronale netwerken --- fuzzy logic --- cybernetica --- multimedia --- tekstverwerking --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- computernetwerken --- communicatietechnologie
Listing 1 - 10 of 16 | << page >> |
Sort by
|