top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
AI, Blockchain and Self-Sovereign Identity in Higher Education / / edited by Hamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt
AI, Blockchain and Self-Sovereign Identity in Higher Education / / edited by Hamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt
Autore Jahankhani Hamid
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (315 pages)
Disciplina 005.8
378.17344678
Altri autori (Persone) JamalArshad
BrownGuy
SainidisEustathios
FongRose
ButtUsman J
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Artificial intelligence
Computer networks—Security measures
Education, Higher
Data and Information Security
Artificial Intelligence
Mobile and Network Security
Higher Education
ISBN 3-031-33627-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Higher Education Supply Chains -- 2. Fighting the Tide – GPT and An Alarming Sense of Déjà Vu -- 3. Embedding AI in Higher Education: a call for a service design approach -- 4. An empirical study into Ransomware campaigns against the Education Sector & adopting the Cybersecurity Maturity Model Certification Framework -- 5. Strategic Decision-Making for Pedagogical Course Planning using NLP in Social Media -- 6. The Use of Virtual Learning Environments in Higher Education – Content, Community and Connectivism – Learning From Student Users -- 7. Influence of Artificial Intelligence in Higher Education; Impact, Risk and Counter Measure -- 8. Development of a Decentralized Personal Indefinable information (PII) management systems using Blockchain DBFT consensus Algorithm -- 9. Security Framework for Big Data usage in cloud-based e-learning application -- 10. A proactive approach to protect cloud computing environment against a Distributed Denial of Service (DDoS) attack.
Record Nr. UNINA-9910734840003321
Jahankhani Hamid  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs [[electronic resource] ] : Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 / / edited by Hamid Jahankhani
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs [[electronic resource] ] : Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 / / edited by Hamid Jahankhani
Autore Jahankhani Hamid
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (436 pages)
Disciplina 006.3
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Artificial intelligence
Computer crimes
Security systems
Artificial Intelligence
Cybercrime
Security Science and Technology
ISBN 3-031-47594-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Cyber Defence -- 2. Space Governance -- 3. AI, Cyber Intelligence and Operation -- 4. Cyber Criminology -- 5. Ethics in Smart and AI driven societies -- 6. Information Systems Security Management -- 7. Digital Forensics investigation.
Record Nr. UNINA-9910838277203321
Jahankhani Hamid  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Space Governance : Challenges, Threats and Countermeasures
Space Governance : Challenges, Threats and Countermeasures
Autore Jahankhani Hamid
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (241 pages)
Altri autori (Persone) KendzierskyjStefan
PournouriSina
PozzaMaria A
Collana Space Law and Policy Series
ISBN 9783031622281
9783031622274
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Space Governance Frameworks and the Role of AI and Quantum Computing -- 1 Introduction -- 1.1 Space History and Current Treaties -- 1.2 Non-Binding and Binding Agreements in Space Governance -- 1.3 Role of NATO and the UN in Space -- 2 Satellite Technology and Operations -- 2.1 Ground-Based Satellite Systems -- 2.2 Satellite Communication Protocols and Standards -- 2.3 Satellite Threats -- 2.4 Privatisation and the Proliferation of Satellites -- 3 Cybersecurity AI-Based Attacks and Quantum Computing Impacts -- 3.1 Impacts of Quantum Computing on Satellite Communications -- 4 The Road to an Effective Space Governance Framework and Cybersecurity Mitigations -- 4.1 Comprehensive Cybersecurity and Overarching Space Asset Protection -- 4.2 Current Satellite Governance -- 4.3 Potential Framework Concepts -- 5 Conclusions -- References -- Defining the Maritime Cyber Adversarial Taxonomy of Tactics and Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Onboard Cyber Physical Systems -- 2.2 Electronic Chart Display and Information System (ECDIS) -- 2.3 Event Data Recorder -- 2.4 Automatic Identification System (AIS) -- 2.5 Global Navigation Safety System (GNSS) -- 2.6 The Future -- 3 Adversarial Behaviours and Modelling Techniques -- 3.1 Attack Trees -- 3.2 Lockheed Martin Cyber Kill Chain -- 3.3 MITRE ATT& -- CK & -- Navigator -- 3.4 Unified Kill Chain -- 4 Data Collection and Critical Discussions -- 5 Inclusion Criteria -- 6 Exclusion Criteria -- 6.1 Collection Methodology -- 6.2 Critical Discussion -- 7 Conclusions -- References -- Enhancing Security of Unmanned Aerial Vehicle Through Vulnerability Assessment and Penetration Testing: A Case Study on Parrot AR Drone 2.0 -- 1 Background -- 1.1 Common Security Threats to Drones -- 1.2 Related Works -- 2 Methodology -- 2.1 Research and Experiment Design.
2.2 Vulnerability Assessment -- 2.3 Penetration Testing -- 2.4 Data Collection -- 2.5 Data Analysis -- 2.6 Evaluation -- 2.7 Ethical Considerations -- 2.8 Threats Modeling -- 2.9 Summary -- 3 Discussion -- 3.1 Comparison to Existing Research -- 3.2 Comparison of Vulnerability Types -- 3.3 Severity and Impact Comparison -- 3.4 Attack Surface Comparison -- 3.5 Unique Security Challenges -- 3.6 Contributions and Insights -- 3.7 Recommendations -- 4 Experiment Results -- 5 Conclusion and Future Research -- References -- Quantum Technologies for Space and Aerial Vehicles -- 1 Introduction -- 2 Quantum Computing Applications for Spacecraft and UAVs -- 2.1 Quantum Computing -- 2.2 Solving Optimization Problems -- 2.3 Quantum Machine Learning -- 2.4 Quantum Simulations -- 3 Quantum Optimization and Data Analytics -- 3.1 Optimized Scheduling -- 3.2 Efficient Route Planning -- 3.3 Network Optimization -- 3.4 Data Processing and Analytics -- 4 Quantum Communication -- 4.1 Quantum-Resistant Encryption -- 4.2 Protecting Sensitive Data on Satellites and UAVs -- 4.3 Quantum Cryptography -- 4.4 Quantum Key Distribution -- 4.5 QKD Experiments -- 5 Challenges -- 6 Governance, Policy, and Standardization -- 7 Conclusion -- References -- Secure and Resilient IP-Satellite Communication Infrastructure -- 1 Introduction -- 2 Literature Review -- 2.1 Cybersecurity Risks and Threats in Ground-Based Satellite Operations -- 2.2 Identification and Classification of Cyber Threats Specific to Ground-Based Satellite Operations. -- 2.3 Case Studies/Examples of Cybersecurity Incidents in Ground-Based Satellite Operations -- 2.4 Communication in Ground-Based Satellite Operations -- 2.5 Satellite Communication Protocols and Standards -- 2.6 Satellite Communication in the Age of Quantum Computing -- 3 Simulation Process -- 3.1 Practical Work.
3.2 Testing RSA Encryption Using Shor's Algorithm -- 3.3 Results and Implications -- 3.4 Communication Simulation -- 3.5 Comparative Analysis and Evaluation -- 4 Conclusion and Future Work -- References -- Leveraging AI and Blockchain for Space Mining -- 1 Introduction -- 2 Background and Literature Review -- 3 Overview of Existing Literature on Space Mining, Focusing on Technological, Legal, and Ethical Considerations -- 4 The Current State of AI and Blockchain Technologies in Terrestrial Mining Operations -- 5 Gaps in the Literature, Particularly Regarding the Application of These Technologies in Space Mining -- 6 The Methodological Approach for Analysing the Potential Application of AI and Blockchain in Space Mining -- 7 Description of the Comparative Analysis Framework Used to Integrate Findings From the Terrestrial Mining Sector -- 8 Potential Application of Blockchain for Secure and Transparent Record-Keeping in Space Mining Cadastres -- 9 Analysis of AI's Impact on Enhancing Operational Efficiency in Mining, With Insights From Terrestrial Mining -- 10 Exploration of AI's Potential in Optimizing Mineral Identification and Extraction Processes in Space Mining -- 11 Discussion on the Challenges and Opportunities of International Regulatory Compliance for Space Mining, Informed by the Adoption of AI and Blockchain in Zimbabwe -- 12 Ethical and Cultural Considerations in Implementing Technology-Driven Mining Solutions, With Lessons From Terrestrial Mining -- 13 Overview of Technological, Legal, and Socio-Economic Challenges in Integrating AI and Blockchain Into Space Mining -- 14 Solutions and Strategic Approaches Derived From Terrestrial Mining Experiences With These Technologies in Extra-Terrestrial Mining -- 15 Analyse Future Technological Trends Impacting Space Mining, Including Quantum Computing and Next-Gen Blockchain Solutions.
16 The Role of International Collaboration and Innovation in Addressing the Evolving Challenges of Space Mining -- 17 Conclusion -- References -- An Investigation into Counter Drones Digital Forensics Aided by Remote Identification -- 1 Introduction -- 2 Literature Review -- 2.1 Drones -- 2.2 Drones in the Sky -- 2.3 Drones Underwater -- 2.4 Drones Underground -- 2.5 Remote Identification (RID) -- 2.6 Remote ID Framework -- 2.7 Drones Digital Forensics -- 2.8 Rogue Drone Scenarios -- 3 Potential Future Research Opportunities -- 4 Conclusions -- References -- Unmanned Aerial Vehicles (UAVs): Forensic, Privacy, and Security Challenges in the Era of Drone Proliferation -- 1 Introduction -- 2 Background -- 2.1 UAV Uses -- 2.2 Types of UAVs -- 2.3 Terrorist Use of UAVs -- 3 Challenges Related to the Malicious Use of Drones -- 3.1 Forensic Challenges -- 3.2 Privacy and Security Concerns -- 4 Current Laws and Legislation Overseeing the Use of UAVs -- 5 Recommendations -- 6 Conclusion and the Future of Drones -- References.
Record Nr. UNINA-9910878989503321
Jahankhani Hamid  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Networks : Cyber Security Threats and Countermeasures / / edited by Hamid Jahankhani, Ayman El Hajjar
Wireless Networks : Cyber Security Threats and Countermeasures / / edited by Hamid Jahankhani, Ayman El Hajjar
Autore Jahankhani Hamid
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (352 pages)
Disciplina 005.8
Altri autori (Persone) El HajjarAyman
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Computer networks - Security measures
Wireless communication systems
Mobile communication systems
Computer crimes
Data and Information Security
Mobile and Network Security
Wireless and Mobile Communication
Cybercrime
ISBN 3-031-33631-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Key-Pre Distribution for the Internet of Things -- 2. Approaches and Methods for Regulation of Security Risks in 5G and 6G -- 3. Investigating Gesture Control of Smart Cities -- 4. Safety And Security Issues in Employing Drones -- 5. Security Threats of Unmanned Aerial Vehicles -- 6. A Machine Learning Based Approach to Detect Cyber-Attacks on Connected and Autonomous Vehicles (CAVs) -- 7. Security and Privacy Concerns in Next-Generation Networks using Artificial Intelligence-based Solutions: A Potential Use Case -- 8. A Blockchain-enabled Approach for Secure Data Sharing in 6G-based Internet of Things Networks.
Record Nr. UNINA-9910742497903321
Jahankhani Hamid  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui