Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
| Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (VI, 290 p. 111 illus., 93 illus. in color.) |
| Disciplina | 005.824 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Computers Artificial intelligence Computer communication systems Security Information Systems and Communication Service Artificial Intelligence Computer Communication Networks |
| ISBN | 3-030-38181-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism. |
| Record Nr. | UNISA-996465446403316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Blockchain Cybersecurity, Trust and Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
| Blockchain Cybersecurity, Trust and Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (VI, 290 p. 111 illus., 93 illus. in color.) |
| Disciplina | 005.824 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Computers Artificial intelligence Computer networks Security Information Systems and Communication Service Artificial Intelligence Computer Communication Networks |
| ISBN | 3-030-38181-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism. |
| Record Nr. | UNINA-9910410057403321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Contemporary digital forensic investigations of cloud and mobile applications / / edited by Kim-Kwang Raymond Choo, University of Texas at San Antonio, San Antonio, TX, United States, University of South Australia, Adelaide, SA, Australia, Ali Dehghantanha, University of Salford, Salford, United Kingdom
| Contemporary digital forensic investigations of cloud and mobile applications / / edited by Kim-Kwang Raymond Choo, University of Texas at San Antonio, San Antonio, TX, United States, University of South Australia, Adelaide, SA, Australia, Ali Dehghantanha, University of Salford, Salford, United Kingdom |
| Autore | Choo Kim-Kwang |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Cambridge, MA : , : Syngress, , [2017] |
| Descrizione fisica | 1 online resource (xi, 313 pages) : illustrations (chiefly color), maps |
| Disciplina | 004.6782 |
| Collana | Syngress advanced topics in information security |
| Soggetto topico |
Computer crimes - Investigation
Forensic sciences Mobile communication systems Cloud computing Mobile computing Mobile device forensics |
| ISBN | 0-12-805448-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Contemporary digital forensics investigations of cloud and mobile applications / K.-K.R. Choo, A. Dehghantanha -- Forensics analysis of Android mobile VoIP apps / T. Dargahi, A. Dehghantanha, M. Conti -- Investigating America Online instant messaging application : data remnants on Windows 8.1 client machine / T.Y. Yang, A. Dehghantanha, K.-K.R. Choo, Z. Muda -- Forensic investigation of social media and instant messaging services in Firefox OS : Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies / M.N. Yusoff, A. Dehghantanha, R. Mahmod -- Network traffic forensics on Firefox Mobile OS : Facebook, Twitter, and Telegram as case studies / M.N. Yusoff, A. Dehghantanha, R. Mahmod -- Mobile phone forensics : an investigative framework based on user impulsivity and secure collaboration errors / M. Petraityte, A. Dehghantanha, G. Epiphaniou -- Performance of Android forensics data recovery tools / B.C. Ogazi-Onyemaechi, A. Dehghantanha, K.-K.R. Choo -- Honeypots for employee information security awareness and education training : a conceptual EASY training model / L. Christopher, K.-K.R. Choo, A. Dehghantanha -- Implications of emerging technologies to incident handling and digital forensic strategies : a routine activity theory / N.H. Ab Rahman, G.C. Kessler, K.-K.R. Choo -- Forensic readiness : a case study on digital CCTV systems antiforensics / A. Ariffin, K.-K.R. Choo, Z. Yunos -- Forensic visualization : survey and future research directions / C. Tassone, B. Martini, K.-K.R. Choo -- Investigating storage as a service cloud platform : pCloud as a case study / T. Dargahi, A. Dehghantanha, M. Conti -- Cloud storage forensics : analysis of data remnants on SpiderOak, JustCloud, and pCloud / S.H. Mohtasebi, A. Dehghantanha, K.-K.R. Choo -- Residual cloud forensics : CloudMe and 360Yunpan as case studies / A. Dehghantanha, T. Dargahi -- An Android Cloud storage apps forensic taxonomy / M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, A. Dehghantanha. |
| Record Nr. | UNINA-9910583479203321 |
Choo Kim-Kwang
|
||
| Cambridge, MA : , : Syngress, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Security Intelligence and Analytics / / edited by Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh
| Cyber Security Intelligence and Analytics / / edited by Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (1,476 pages) |
| Disciplina | 005.8 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
| ISBN | 3-030-15235-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Application of the CT Image Processing in the Urology Surgery -- Application of the Data Mining Technology in the Economic Management in the Age of Big Data -- Comprehensive Evaluation System which Adapt to the Layout of Power Facilities and the Utilization of Channel Resource Based on the New-type Urbanization -- Computer Desktop Image Compression Technology Based on the Clustering Algorithm -- Construction of the English Teaching Model Based on the Interactive Network Streaming Media -- Design and Implementation of the Image Processing Software Based on the Infrared Image Feature Matching -- Design and Implementation of the Image Processing Software Based on the Wavelet Transform -- Design and Implementation of the School Sports Management System Based on WEB -- Design and Research on the Chinese Medicine Health Management System Based on the Wireless Sensor Network -- Design of the In-depth Intelligence Education System Based on the Intercultural Communication. |
| Record Nr. | UNINA-9910483949903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Threat Intelligence / / edited by Ali Dehghantanha, Mauro Conti, Tooska Dargahi
| Cyber Threat Intelligence / / edited by Ali Dehghantanha, Mauro Conti, Tooska Dargahi |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (334 pages) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Artificial intelligence Computer networks Data and Information Security Artificial Intelligence Computer Communication Networks |
| ISBN | 3-319-73951-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Machine Learning Aided Static Malware Analysis -- 3 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection -- 4 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Classification Algorithms -- 5 Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection -- 6 Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware -- 7 BoTShark - A Deep Learning Approach for Botnet Traffic Detection -- 8 A Practical Analysis of The Rise in Mobile Phishing -- 9 PDF-Malware Detection: A Survey and Taxonomy of Current Techniques -- 10 Adaptive Traffic Fingerprinting for Darknet Threat Intelligence -- 11 A Model for Android and iOS Applications Risk Calculations: CVSS Analysis and Enhancement Using Case-Control Studies -- 12 A Honeypot Proxy Framework for Deceiving Attackers with Fabricated Content -- 13 Investigating the Possibility of Data Leakage in Time of Live VM Migration -- 14 Forensics Investigation of OpenFlow-Based SDN Platforms -- 15 Mobile Forensics: A Bibliometric Analysis -- 16 Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies. |
| Record Nr. | UNINA-9910299281403321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of big data analytics and forensics / / Kim-Kwang Raymond Choo, Ali Dehghantanha, editors
| Handbook of big data analytics and forensics / / Kim-Kwang Raymond Choo, Ali Dehghantanha, editors |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (288 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Big data |
| ISBN | 3-030-74753-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910523003703321 |
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of big data analytics and forensics / / Kim-Kwang Raymond Choo, Ali Dehghantanha, editors
| Handbook of big data analytics and forensics / / Kim-Kwang Raymond Choo, Ali Dehghantanha, editors |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (288 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Big data |
| ISBN | 3-030-74753-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464546203316 |
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Handbook of Big Data and IoT Security / / edited by Ali Dehghantanha, Kim-Kwang Raymond Choo
| Handbook of Big Data and IoT Security / / edited by Ali Dehghantanha, Kim-Kwang Raymond Choo |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (382 pages) |
| Disciplina | 005.7 |
| Soggetto topico |
Data protection
Computers Artificial intelligence Security Information Systems and Communication Service Artificial Intelligence |
| ISBN | 3-030-10543-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Big Data and Internet of Things Security and Forensics: Challenges and Opportunities -- 2 Privacy of Big Data - a Review -- 3 A Bibliometric Analysis of Authentication and Access Control in IoT Devices -- 4 Towards Indeterminacy - Tolerant Access Control in IoT -- 5 Private Cloud Storage Forensics: Seafile as a Case Study -- 6 Distributed Filesystem Forensics: Ceph as a Case Study -- 7 Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study -- 8 Big Data Forensics: Hadoop Distributed File Systems as a Case Study -- 9 Internet of Things Camera Identi cation Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform -- 10 Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats -- 11 Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study -- 12 A Cyber Kill Chain Based Analysis of Remote Access Trojans -- 13 Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications -- 14 Bibliometric Analysis on the Rise of Cloud Security -- 15 A Bibliometric Analysis of Botnet Detection Techniques -- 16 Security in Online Games: Current Implementations and Challenges. . |
| Record Nr. | UNINA-9910337565603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
| Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.) |
| Disciplina | 005.8 |
| Soggetto topico |
Data protection
Computer organization Artificial intelligence Computers Security Computer Systems Organization and Communication Networks Artificial Intelligence Information Systems and Communication Service Seguretat informàtica Dades massives Protecció de dades Intel·ligència artificial |
| Soggetto genere / forma | Llibres electrònics |
| ISBN | 3-030-38557-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- . |
| Record Nr. | UNISA-996465359103316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
| Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.) |
| Disciplina | 005.8 |
| Soggetto topico |
Data protection
Computer organization Artificial intelligence Computers Security Computer Systems Organization and Communication Networks Artificial Intelligence Information Systems and Communication Service Seguretat informàtica Dades massives Protecció de dades Intel·ligència artificial |
| Soggetto genere / forma | Llibres electrònics |
| ISBN | 3-030-38557-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- . |
| Record Nr. | UNINA-9910410051603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||