Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included. The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style…mehr
Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included.
The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.
1 Critical Analysis of Blockchain for Internet of Everything
BUSHRA HOSSAIN
2 IoT Blockchain Integration: A Security Perspective
KAZIM RIFAT ÖZYILMAZ AND ARDA YURDAKUL
3 An Overview of the Dark Web
SHAHRIN SADIK AND MOHIUDDIN AHMED
Section II CYBER GOVERNANCE
4 Cyber Security in the Public Sector: Awareness of Potential Risks among Public Policy Executives
TAHMINA RASHID AND KHALID CHAUHAN
5 A Benefits Realization Approach to Cyber Security Projects Implementation in Public Sector Organizations
MUNIR A. SAEED, TAHMINA RASHID, AND MOHIUDDIN AHMED
Section III ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
6 An Investigation of Performance Analysis of Machine Learning-Based Techniques for Network Anomaly Detection
KEVIN CHONG, MOHIUDDIN AHMED, AND SYED MOHAMMED SHAMSUL ISLAM
7 The Kernel-Based Online Anomaly Detection Algorithm: Detailed Derivation and Development
SALVA DANESHGADEH, TAREM AHMED, AND AL-SAKIB KHAN PATHAN
8 Secure Addressing Protocols for Mobile Ad Hoc Networks
UTTAM GHOSH, PUSHPITA CHATTERJEE, RAJA DATTA, AL-SAKIB KHAN PATHAN, AND DANDA B. RAWAT
Section IV CYBER CHALLENGES
9 Cryptographic Attacks, Impacts and Countermeasures
HAZAA AL FAHDI AND MOHIUDDIN AHMED
10 Cyber Security for Network of Things (NoTs) in Military Systems: Challenges and Countermeasures
MUHAMMAD IMRAN MALIK, IAN NOEL McATEER, PETER HANNAY, AHMED IBRAHIM, ZUBAIR BAIG, AND GUANGLOU ZHENG
Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der Steintor 70. V V GmbH (zukünftig firmierend: buecher.de internetstores GmbH)
Geschäftsführung: Monica Sawhney | Roland Kölbl
Sitz der Gesellschaft: Hannover
Amtsgericht Hannover HRB 227001
Steuernummer: 321/neu