Cloud Security
Concepts, Applications and Perspectives
Herausgeber: Gupta, Brij B
Cloud Security
Concepts, Applications and Perspectives
Herausgeber: Gupta, Brij B
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
Andere Kunden interessierten sich auch für
- Data Science and Big Data Analytics in Smart Environments219,99 €
- Trust, Security and Privacy for Big Data219,99 €
- Computational Intelligence for Wireless Sensor Networks132,99 €
- Joao GamaKnowledge Discovery from Data Streams132,99 €
- Tanya KolosovaSupervised Machine Learning176,99 €
- Meredith ZozusThe Data Book115,99 €
- Nachshon Goltz (Sean)Real World AI Ethics for Data Scientists217,99 €
-
-
-
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
Produktdetails
- Produktdetails
- Verlag: Taylor and Francis
- Seitenzahl: 258
- Erscheinungstermin: 26. Mai 2021
- Englisch
- Abmessung: 234mm x 156mm x 16mm
- Gewicht: 540g
- ISBN-13: 9780367407155
- ISBN-10: 0367407159
- Artikelnr.: 62086002
- Verlag: Taylor and Francis
- Seitenzahl: 258
- Erscheinungstermin: 26. Mai 2021
- Englisch
- Abmessung: 234mm x 156mm x 16mm
- Gewicht: 540g
- ISBN-13: 9780367407155
- ISBN-10: 0367407159
- Artikelnr.: 62086002
Brij B. Gupta received a PhD degree from Indian Institute of Technology Roorkee, India. In 2009, he was selected for the Canadian Commonwealth Scholarship awarded by the Government of Canada. He published more than 250 research papers in International Journals and Conferences of high repute. At present, Dr. Gupta is working as an Assistant Professor with National Institute of Technology, Kurukshetra, India. His research interest includes Information Security, Cyber Security, Cloud Computing, Web Securit, and Phishing.
Secured IoT devices management in Cloud-Fog Environment using Blockchain.
Integrating Cloud and Health Informatics: Approaches, Applications and
Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on
HTTP. Explicating Fog Computing: Key Research Challenges and Solutions.
Comparison of Various Techniques for Emergency Vehicle Detection using
Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure
Authentication Protocol with Privacy Preserving for Industrial Internet of
Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party
Authenticated Key Exchange Protocol for Mobile Environment.
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber
Physical Systems. Active Forgery Detection in Grayscale Images using
CRC-8based Fragile Watermarking. Android Malware Classification using
Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute
Based Encryption for Internet of Things. An Improved Two Factor
Authentication Scheme for TMIS based on Dual Biometrics. Identifying and
Mitigating Against XSS Attacks in Web Applications. Statistical Analysis
Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud
based Security Analysis in Body Area Network for Health Care Applications.
Fog Robotics: A New Perspective for Cloud-based Robots.
Integrating Cloud and Health Informatics: Approaches, Applications and
Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on
HTTP. Explicating Fog Computing: Key Research Challenges and Solutions.
Comparison of Various Techniques for Emergency Vehicle Detection using
Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure
Authentication Protocol with Privacy Preserving for Industrial Internet of
Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party
Authenticated Key Exchange Protocol for Mobile Environment.
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber
Physical Systems. Active Forgery Detection in Grayscale Images using
CRC-8based Fragile Watermarking. Android Malware Classification using
Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute
Based Encryption for Internet of Things. An Improved Two Factor
Authentication Scheme for TMIS based on Dual Biometrics. Identifying and
Mitigating Against XSS Attacks in Web Applications. Statistical Analysis
Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud
based Security Analysis in Body Area Network for Health Care Applications.
Fog Robotics: A New Perspective for Cloud-based Robots.
Secured IoT devices management in Cloud-Fog Environment using Blockchain.
Integrating Cloud and Health Informatics: Approaches, Applications and
Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on
HTTP. Explicating Fog Computing: Key Research Challenges and Solutions.
Comparison of Various Techniques for Emergency Vehicle Detection using
Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure
Authentication Protocol with Privacy Preserving for Industrial Internet of
Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party
Authenticated Key Exchange Protocol for Mobile Environment.
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber
Physical Systems. Active Forgery Detection in Grayscale Images using
CRC-8based Fragile Watermarking. Android Malware Classification using
Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute
Based Encryption for Internet of Things. An Improved Two Factor
Authentication Scheme for TMIS based on Dual Biometrics. Identifying and
Mitigating Against XSS Attacks in Web Applications. Statistical Analysis
Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud
based Security Analysis in Body Area Network for Health Care Applications.
Fog Robotics: A New Perspective for Cloud-based Robots.
Integrating Cloud and Health Informatics: Approaches, Applications and
Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on
HTTP. Explicating Fog Computing: Key Research Challenges and Solutions.
Comparison of Various Techniques for Emergency Vehicle Detection using
Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure
Authentication Protocol with Privacy Preserving for Industrial Internet of
Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party
Authenticated Key Exchange Protocol for Mobile Environment.
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber
Physical Systems. Active Forgery Detection in Grayscale Images using
CRC-8based Fragile Watermarking. Android Malware Classification using
Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute
Based Encryption for Internet of Things. An Improved Two Factor
Authentication Scheme for TMIS based on Dual Biometrics. Identifying and
Mitigating Against XSS Attacks in Web Applications. Statistical Analysis
Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud
based Security Analysis in Body Area Network for Health Care Applications.
Fog Robotics: A New Perspective for Cloud-based Robots.