top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Handbook of Computer Networks and Cyber Security [[electronic resource] ] : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Handbook of Computer Networks and Cyber Security [[electronic resource] ] : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xx, 959 pages) : illustrations
Disciplina 004.6
Soggetto topico Data protection
Computer communication systems
Computers
Artificial intelligence
Security
Computer Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 3-030-22277-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
Record Nr. UNISA-996465441903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xx, 959 pages) : illustrations
Disciplina 004.6
Soggetto topico Data protection
Computer networks
Computers
Artificial intelligence
Security
Computer Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 3-030-22277-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
Record Nr. UNINA-9910366655603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / / edited by Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / / edited by Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta
Autore Abd El-Latif Ahmed A
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (259 pages)
Disciplina 621.382
Altri autori (Persone) TawalbehLo'ai
MalehYassine
GuptaBrij B
Collana EAI/Springer Innovations in Communication and Computing
Soggetto topico Telecommunication
Data protection
Security systems
Database management
Communications Engineering, Networks
Data and Information Security
Security Science and Technology
Database Management System
ISBN 3-031-51097-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: AI Enabled Smart City IoT System using Edge /Fog Computing -- Chapter 1. Multi-level edge computing system for autonomous vehicles -- Chapter 2. UAVs based edge computing system for smart city applications -- Chapter 3. Organization of Smart City Services Based on Microservice Architecture -- Chapter 4. Pseudo-Random Error-Correcting Codes in Network Coding -- Chapter 5. Proactive management in Smart City: transport convoys -- Chapter 6. Federated Learning for Linux Malware Detection: An Experimental Study -- Chapter 7. Delay prediction in M2M networks using Deep Learning approach -- Chapter 8. Energy-Efficient Beam Shaping in MIMO System Using Machine Learning -- Chapter 9. Channel Cluster Configuration Selection Method for IEEE 802.11 Networks Planning -- Chapter 10. Service migration algorithm for UAVs recharge zones in future 6G network -- Chapter 11. FedBA: Non-IID Federated Learning Framework in UAV Networks -- Part 2: Fog/Edge Computing Security Issues -- Chapter 12. Big Data Analytics for Secure Edge-based Manufacturing Internet of Things (MIoT) -- Chapter 13. Artificial Intelligence-Based Secure Edge Computing Systems for IoTDs and Smart Cities: A Survey -- Chapter 14. Machine Learning Techniques for Secure Edge SDN -- Chapter 15. Machine Learning-Based Identity and Access Management for Cloud Security -- Chapter 16. Spatial Data of Smart Cities: Trust -- Chapter 17. Smart City Infrastructure Projects: Spatial Data of Risks -- Chapter 18. A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks -- Chapter 19. Development of determining a wireless client location method in the IEEE 802.11 network in order to ensure the IT infrastructure security.
Record Nr. UNINA-9910845481903321
Abd El-Latif Ahmed A  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions
Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions
Autore Abd El-Latif Ahmed A
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (283 pages)
Altri autori (Persone) Abd-El-AttyBassem
Venegas-AndracaSalvador E
MazurczykWojciech
GuptaBrij B
Collana Studies in Big Data Ser.
Soggetto genere / forma Electronic books.
ISBN 3-030-85428-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910502978403321
Abd El-Latif Ahmed A  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui