Cyber Security for Next-Generation Computing Technologies (eBook, ePUB)
Redaktion: Ullah Khan, Inam; Fazal Ijaz, Muhammad; Abou El Houda, Zakaria; Ouaissa, Mariyam; Ouaissa, Mariya
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Cyber Security for Next-Generation Computing Technologies (eBook, ePUB)
Redaktion: Ullah Khan, Inam; Fazal Ijaz, Muhammad; Abou El Houda, Zakaria; Ouaissa, Mariyam; Ouaissa, Mariya
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 6.44MB
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 328
- Erscheinungstermin: 16. Januar 2024
- Englisch
- ISBN-13: 9781003826422
- Artikelnr.: 69359036
- Verlag: Taylor & Francis
- Seitenzahl: 328
- Erscheinungstermin: 16. Januar 2024
- Englisch
- ISBN-13: 9781003826422
- Artikelnr.: 69359036
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Dr. Inam Ullah Khan is a visiting researcher at king's college London, UK. was a Lecturer at different universities in Pakistan which include Center for Emerging Sciences Engineering & Technology (CESET), Islamabad, Abdul Wali Khan University, Garden and Timergara Campus and University of Swat. He did his Ph.D in Electronics Engineering from Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He had completed his M.S. degree in Electronic Engineering at Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He had done undergraduate degree in Bachelor of Computer Science from Abdul Wali Khan University Mardan, Pakistan.Apart from that his Master's thesis is published as a book on topic" Route Optimization with Ant Colony Optimization (ACO)" in Germany which is avaliable on Amazon.He is a research scholar; he has published some research papers at international level. More interestingly he recently introduced a novel routing protocol E-ANTHOCNET in the area of flying ad hoc networks. His research interest includes Network System Security, Intrusion Detection, Intrusion Prevention, cryptography, Optimization techniques, WSN, IoT, UAV's, Mobile Ad Hoc Networks (MANETS), Flying Ad Hoc Networks, and Machine Learning. He has served international conferences as Technical program committee member which include, EAI International Conference on Future Intelligent Vehicular Technologies, Islamabad, Pakistan and 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26-27, 2018 and now recently working on the same level at International Workshop on Computational Intelligence and Cybersecurity in Emergent Networks (CICEN'21) that will be held in conjunction with the 12th International Conference on Ambient Systems, Networks and Technologies (EUSPN 2021) which is co-organized in November 1-4, 2021, Leuven, Belgium. He has published more than 20 research papers (this includes book chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts) and 3 edited books. Dr. Mariya Ouaissa is currently a Professor at Institute Specializing in New Information and Communication Technologies, Researcher Associate and practitioner with industry and academic experience. She is a Ph.D. graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga, Morocco. She is a Co-Founder and IT Consultant at IT Support and Consulting Center. She was working for School of Technology of Meknes Morocco as a Visiting Professor from 2013 to 2021. She is member of the International Association of Engineers and International Association of Online Engineering, and since 2021, she is an "ACM Professional Member". She is Expert Reviewer with Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has served and continues to serve on technical program and organizer committees of several conferences and events and has organized many Symposiums/Workshops/Conferences as a General Chair also as a reviewer of numerous international journals. Dr. Ouaissa has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained networks security. Her main research topics are IoT, M2M, D2D, WSN, Cellular Networks, and Vehicular Networks. She has published over 40 papers (book chapters, international journals, and conferences/workshops), 10 edited books, and 8 special issue as guest editor. Dr. Mariyam Ouaissa is currently a Professor at Institute specializing in new information and communication technologies, Researcher Associate and Consultant Trainer in Computer Science and Networks. She received her Ph.D. degree in 2019 from National Graduate School of Arts and Crafts, Meknes, Morocco and her Engineering Degree in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a communication and networking researcher and practitioner with industry and academic experience. Dr Ouaissa's research is multidisciplinary that focuses on Internet of Things, M2M, WSN, vehicular communications and cellular networks, security networks, congestion overload problem and the resource allocation management and access control. She is serving as a reviewer for international journals and conferences including as IEEE Access, Wireless Communications and Mobile Computing. Since 2020, she is a member of "International Association of Engineers IAENG" and "International Association of Online Engineering", and since 2021, she is an "ACM Professional Member". She has published more than 30 research papers (this includes book chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts), 10 edited books, and 6 special issue as guest editor. She has served on Program Committees and Organizing Committees of several conferences and events and has organized many Symposiums / Workshops / Conferences as a General Chair. Dr. Zakaria Abou El Houda currentlly Professor at L@bisen, Yncrea Oust France, She was a researcher at the Department of Computer Science and Operations Research, Université de Montréal, Montréal, Canada. He received the M.Sc. degree in computer networks from Paul Sabatier University, Toulouse, France, the Ph.D. degree in computer science from the University of Montréal, Canada and the Ph.D. degree in computer engineering from the University of Technology of Troyes, Troyes, France. He has made contributions in the fields of Information security, intrusion detection/prevention system, and security in software defined network. His current research interests include ML/DL-based intrusion detection, Federated learning, and Blockchain. He has also served and continues to serve on technical program committees and as a reviewer of several international conferences and journals, including IEEE ICC, IEEE Globecom, and IEEE transactions. Dr. Muhammad Fazal Ijaz received his B.Eng. degree in Industrial Engineering and Management from University of the Punjab, Lahore, Pakistan, in 2011, and Dr. Eng. degree in Industrial and Systems Engineering from Dongguk University, Seoul, South Korea, in 2019. From 2019 to 2020, he worked as an Assistant Professor in Department of Industrial and Systems Engineering, Dongguk University, Seoul, South Korea. Currently, he is working as an Assistant Professor in Department of Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea. He has published numerous research articles in several international peer-reviewed journals, including Scientific Reports, IEEE Transactions on Industrial Informatics, IEEE Access, Sensors, Journal of Food Engineering, Applied Sciences, and Sustainability. His research interests include Machine learning, Blockchain, Healthcare Engineering, Internet of Things, Big data, and Data mining.
Chapter 1 Cyber Security: Future Trends and Solutions
Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar
Chapter 2 Security and Intelligent Management: Survey
Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, and Muhammad Allah Rakha
Chapter 3 Comparative Analysis of Machine and Deep Learning for Cyber Security
Hafsa Maryam, Syeda Zillay Nain Zukhraf, and Rehmat Ullah
Chapter 4 AI-Based Secure Wireless Communication Technologies and Cyber Threats for IoT Networks
Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, and Salma El Hajjami
Chapter 5 Cyber Threat Actors Review: Examining the Tactics and Motivations of Adversaries in the Cyber Landscape
Zakaria Abou El Houda
Chapter 6 Layer-Based Security Threats in IoT Networks
Muna Muhammad, Ahthasham Sajid, and Hira Arshad
Chapter 7 Intrusion Detection System Using AI and Machine Learning Algorithm
Muhammad Tehmasib Ali Tashfeen
Chapter 8 Signature-Based Intrusion Detection System for IoT
Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, and Muhammad Fayaz
Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the MQTT-IoT-IDS2020 Dataset
Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, and Muhammad Yaseen Ayub
Chapter 10 Cyber Security for Edge/Fog Computing Applications
Hanane Lamaazi
Chapter 11 Cyber Attacks Against Intelligent Transportation Systems
Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid
Chapter 12 Intelligent Transportation Systems for IoT-Based UAV Networks
Mamoona Jamil, Usman Haider, Inam Ullah Khan, and Tarandeep Kaur Bhatia
Chapter 13 Cyber Attack Detection Analysis Using Machine Learning
for IoT-Based UAV Network
Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia, and Inam Ullah Khan
Chapter 14 Blockchain Solutions for Cyber Criminals
Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, and Bhupendra Kumar Soni
Chapter 15 Blockchain Security Measures to Combat Cyber Crime Rahmeh Ibrahim and Qasem Abu Al-Haija
Chapter 16 AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective
Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman Khan, and Inam Ullah Khan
Chapter 1 Cyber Security: Future Trends and Solutions
Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar
Chapter 2 Security and Intelligent Management: Survey
Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, and Muhammad Allah Rakha
Chapter 3 Comparative Analysis of Machine and Deep Learning for Cyber Security
Hafsa Maryam, Syeda Zillay Nain Zukhraf, and Rehmat Ullah
Chapter 4 AI-Based Secure Wireless Communication Technologies and Cyber Threats for IoT Networks
Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, and Salma El Hajjami
Chapter 5 Cyber Threat Actors Review: Examining the Tactics and Motivations of Adversaries in the Cyber Landscape
Zakaria Abou El Houda
Chapter 6 Layer-Based Security Threats in IoT Networks
Muna Muhammad, Ahthasham Sajid, and Hira Arshad
Chapter 7 Intrusion Detection System Using AI and Machine Learning Algorithm
Muhammad Tehmasib Ali Tashfeen
Chapter 8 Signature-Based Intrusion Detection System for IoT
Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, and Muhammad Fayaz
Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the MQTT-IoT-IDS2020 Dataset
Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, and Muhammad Yaseen Ayub
Chapter 10 Cyber Security for Edge/Fog Computing Applications
Hanane Lamaazi
Chapter 11 Cyber Attacks Against Intelligent Transportation Systems
Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid
Chapter 12 Intelligent Transportation Systems for IoT-Based UAV Networks
Mamoona Jamil, Usman Haider, Inam Ullah Khan, and Tarandeep Kaur Bhatia
Chapter 13 Cyber Attack Detection Analysis Using Machine Learning
for IoT-Based UAV Network
Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia, and Inam Ullah Khan
Chapter 14 Blockchain Solutions for Cyber Criminals
Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, and Bhupendra Kumar Soni
Chapter 15 Blockchain Security Measures to Combat Cyber Crime Rahmeh Ibrahim and Qasem Abu Al-Haija
Chapter 16 AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective
Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman Khan, and Inam Ullah Khan