Cybersecurity Issues in Emerging Technologies
Herausgeber: Maglaras, Leandros; Kantzavelou, Ioanna
Cybersecurity Issues in Emerging Technologies
Herausgeber: Maglaras, Leandros; Kantzavelou, Ioanna
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed.
Andere Kunden interessierten sich auch für
- Secure and Smart Cyber-Physical Systems153,99 €
- Industrial Internet of Things Security142,99 €
- Blockchain and IoT Integration141,99 €
- Cognitive Radio152,99 €
- The Next Generation Innovation in IoT and Cloud Computing with Applications152,99 €
- Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing124,99 €
- Digital Afterlife156,99 €
-
-
-
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 204
- Erscheinungstermin: 18. Oktober 2021
- Englisch
- Abmessung: 234mm x 156mm x 14mm
- Gewicht: 499g
- ISBN-13: 9780367626174
- ISBN-10: 0367626179
- Artikelnr.: 62232579
- Verlag: CRC Press
- Seitenzahl: 204
- Erscheinungstermin: 18. Oktober 2021
- Englisch
- Abmessung: 234mm x 156mm x 14mm
- Gewicht: 499g
- ISBN-13: 9780367626174
- ISBN-10: 0367626179
- Artikelnr.: 62232579
Dr. Leandros A. Maglaras is an Associate Professor in the School of Computer Science and Informatics of De Montfort University, conducting research in the Cyber Security Centre. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. in Electrical and Computer Engineering from the Aristotle University of Thessaloniki in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield. He is featured in Stanford University's list of the world Top 2% scientists for the year 2019. He serves on the Editorial Board of several international peer-reviewed journals such as IEEE Access, Elsevier Array is the author of more than 150 papers in scientific magazines and conferences and is a senior member of the IEEE. Dr. Ioanna Kantzavelou is an Assistant Professor at the Dept. of Informatics and Computer Engineering at the School of Engineering of the University of West Attica. She received a B.Sc. in Informatics from the Dept. of Informatics of the Technological Educational Institute of Athens, an MSc by Research in Computer Security from the Dept. of Computer Science at the University College Dublin of the National University of Ireland, and a Ph.D. on Intrusion Detection in Information Technology Security from the Dept. of Information and Communication Systems Engineering at the University of the Aegean. She has worked in R&D projects funded by the Greek government, the Irish government, and the EU. Her published work includes chapters in books (IOS Press), conferences and journals, recording remarkable citations in her research work. She has joint editorship of three IOS Press collections. She has been a repetitive reviewer in many international conferences, such as ACM SEC, IEEE TrustCom, IFIP SEC, ESORICS, IEEE CIS, and she is currently a reviewer for high ranking journals, of IEEE, Elsevier, Springer, and Emerald. She is a member of the Greek Computer Society (GCS), of the ACM and of the IEEE Computer Society.
1. The Evolution of Hardware-Assisted Security
2. Cybersecurity of the Unmanned Ship
3. Agile Incident Response in Industrial Control
4. Multi-Stage Threat Modeling and Security
5. Blockchain Technology for 6G Communication Networks
6. Securing Components on a 5G Core
7. RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks
8. Smart Cars and Over-the-Air Updates
9. Emerging Malware Threats: The Case of Ransomware
10. Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats
in the Cyber Domain
11. The Cyber Skills Gap
2. Cybersecurity of the Unmanned Ship
3. Agile Incident Response in Industrial Control
4. Multi-Stage Threat Modeling and Security
5. Blockchain Technology for 6G Communication Networks
6. Securing Components on a 5G Core
7. RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks
8. Smart Cars and Over-the-Air Updates
9. Emerging Malware Threats: The Case of Ransomware
10. Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats
in the Cyber Domain
11. The Cyber Skills Gap
1. The Evolution of Hardware-Assisted Security
2. Cybersecurity of the Unmanned Ship
3. Agile Incident Response in Industrial Control
4. Multi-Stage Threat Modeling and Security
5. Blockchain Technology for 6G Communication Networks
6. Securing Components on a 5G Core
7. RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks
8. Smart Cars and Over-the-Air Updates
9. Emerging Malware Threats: The Case of Ransomware
10. Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats
in the Cyber Domain
11. The Cyber Skills Gap
2. Cybersecurity of the Unmanned Ship
3. Agile Incident Response in Industrial Control
4. Multi-Stage Threat Modeling and Security
5. Blockchain Technology for 6G Communication Networks
6. Securing Components on a 5G Core
7. RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks
8. Smart Cars and Over-the-Air Updates
9. Emerging Malware Threats: The Case of Ransomware
10. Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats
in the Cyber Domain
11. The Cyber Skills Gap