Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.…mehr
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.
Dr. Iman Almomani received the bachelor’s degree from United Arab Emirates, in 2000, the master’s degree in computer science from Jordan, in 2002, and the Ph.D. degree in wireless network security from De Montfort University, U.K., in 2007. She is currently an Associate Professor in cybersecurity. She is also the Associate Director of the Research and Initiatives Centre (RIC) & the Innovation Center (IC) and also the Leader of the Security Engineering Laboratory (SEL) at Prince Sultan University (PSU), Riyadh, Saudi Arabia. Before Joining Prince Sultan University, she has worked as an Associate Professor and the Head of the Computer Science Department, The University of Jordan, Jordan. Her research interests include wireless networks and security, mainly wireless mobile ad hoc networks (WMANETs), wireless sensor networks (WSNs), multimedia networking (VoIP), and Internet of Things (IoT) security. She is also interested in in mobile operating systems security, including Android security. Iman has a wide experience in terms of applied research and product development in the area of cybersecurity maturity models and Assessment and Compliance Tools. She has several publications in the above areas in a number of reputable international and local journals and conferences. She is also a Senior Member of IEEE WIE. She is on the organizing and technical committees of a number of local and international conferences. She also serves as a reviewer and a member of the editorial board for a number of international journals.
Dr. Leandros A. Maglaras is a professor of cybersecurity in the School of Computing at Edinburgh Napier University. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004,and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield He is featured in Stanford University's list of the world’s Top 2% scientists. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 200 papers in scientific magazines and conferences
Dr. Mohamed Amine Ferrag received the Bachelor’s, Master’s, Ph.D., and Habilitation degrees in computer science from Badji Mokhtar—Annaba University, Annaba, Algeria, in June, 2008, June, 2010, June, 2014, and April, 2019, respectively. From 2014 to 2022, he was an Associate Professor with the Department of Computer Science, Guelma University, Algeria. From 2019 to 2022, he was a Visiting Senior Researcher with the NAU-Lincoln Joint Research Center of Intelligent Engineering, Nanjing Agricultural University, China. Since 2022, he has been the Led Researcher with Artificial Intelligence & Digital Science Research Center, Technology Innovation Institute, Abu Dhabi, United Arab Emirates. His research interests include wireless network security, network coding security, applied cryptography, blockchain technology, and AI for cyber security. He has published over 100 papers in international journals and conferences in the above areas. He has been conducting several research projects with international collaborations on these topics. He was a recipient of the 2021 IEEE TEM Best Paper Award as well as the 2022 Scopus Algeria Award. He is featured in Stanford University’s list of the world’s Top 2% scientists for the years 2020, 2021, and 2022. He is a Senior Member of the Institute of Electrical & Electronic Engineers (IEEE) and a member of the Association for Computing Machinery (ACM).
Dr. Nick Ayres received the Bachelor's degree (July, 1996) in Engineering Information Technology, Master's degree (June, 2013) in Cyber Security, Ph.D. degree (March, 2021) in Computer Science from De Montfort University, United Kingdom. He is a lecturer in Cyber Security specializing in incident response, social engineering and cyberterrorism. His current research interests include over the air automotive software updates and the impact of risk compensation. He has authored a number of publications concerning cyberterrorism as well as other topics including susceptibility to phishing utilizing fuzzy logic as well as several publications regarding automotive technology.
Inhaltsangabe
Part 1. Android Malware Analysis.- Chapter 1. A Deep Vision-based Multi-Class Classification System of Android Malware Apps.- Chapter 2. Android Malware detection based on network analysis and federated learning.- Chapter 3. ASParseV3: Auto Static Parser & Customizable Visualizer.- Part 2. Network Malware Analysis.- Chapter 4. Fast Flux Service Networks: Architecture, Characteristics and Detection Mechanisms.- Chapter 5. Efficient Graph-based Malware Detection using Minimized Kernel and SVM.- Chapter. 6 Deep Learning for Windows Malware Analysis.- Part 3. IoT Malware Analysis.- Chapter 7. Malware analysis for IoT and Smart AI-based Applications.- Chapter 8. A Multi-Class Classification Approach for IoT Intrusion Detection Based on Feature Selection and Oversampling.- Chapter 9. Malware Mitigation in Cloud Computing Architecture.
Part 1. Android Malware Analysis.- Chapter 1. A Deep Vision-based Multi-Class Classification System of Android Malware Apps.- Chapter 2. Android Malware detection based on network analysis and federated learning.- Chapter 3. ASParseV3: Auto Static Parser & Customizable Visualizer.- Part 2. Network Malware Analysis.- Chapter 4. Fast Flux Service Networks: Architecture, Characteristics and Detection Mechanisms.- Chapter 5. Efficient Graph-based Malware Detection using Minimized Kernel and SVM.- Chapter. 6 Deep Learning for Windows Malware Analysis.- Part 3. IoT Malware Analysis.- Chapter 7. Malware analysis for IoT and Smart AI-based Applications.- Chapter 8. A Multi-Class Classification Approach for IoT Intrusion Detection Based on Feature Selection and Oversampling.- Chapter 9. Malware Mitigation in Cloud Computing Architecture.
Part 1. Android Malware Analysis.- Chapter 1. A Deep Vision-based Multi-Class Classification System of Android Malware Apps.- Chapter 2. Android Malware detection based on network analysis and federated learning.- Chapter 3. ASParseV3: Auto Static Parser & Customizable Visualizer.- Part 2. Network Malware Analysis.- Chapter 4. Fast Flux Service Networks: Architecture, Characteristics and Detection Mechanisms.- Chapter 5. Efficient Graph-based Malware Detection using Minimized Kernel and SVM.- Chapter. 6 Deep Learning for Windows Malware Analysis.- Part 3. IoT Malware Analysis.- Chapter 7. Malware analysis for IoT and Smart AI-based Applications.- Chapter 8. A Multi-Class Classification Approach for IoT Intrusion Detection Based on Feature Selection and Oversampling.- Chapter 9. Malware Mitigation in Cloud Computing Architecture.
Part 1. Android Malware Analysis.- Chapter 1. A Deep Vision-based Multi-Class Classification System of Android Malware Apps.- Chapter 2. Android Malware detection based on network analysis and federated learning.- Chapter 3. ASParseV3: Auto Static Parser & Customizable Visualizer.- Part 2. Network Malware Analysis.- Chapter 4. Fast Flux Service Networks: Architecture, Characteristics and Detection Mechanisms.- Chapter 5. Efficient Graph-based Malware Detection using Minimized Kernel and SVM.- Chapter. 6 Deep Learning for Windows Malware Analysis.- Part 3. IoT Malware Analysis.- Chapter 7. Malware analysis for IoT and Smart AI-based Applications.- Chapter 8. A Multi-Class Classification Approach for IoT Intrusion Detection Based on Feature Selection and Oversampling.- Chapter 9. Malware Mitigation in Cloud Computing Architecture.
Rezensionen
"The book makes a substantial addition to the body of knowledge on cybersecurity. It is a must-read for anyone wanting a deeper understanding of the intricacies of cyber malware, due to its thorough coverage of both offensive and defensive techniques, expert analysis, and useful examples. Whether you are a student, researcher, or cybersecurity expert, this book will help you better understand the constantly changing world of cyber threats and how to deal with them." (Mihailescu Marius Iulian, Computing Reviews, February 21, 2024)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497