Handbook of Computer Networks and Cyber Security Principles and Paradigms /

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with exa...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Gupta, Brij B. (Editor, http://id.loc.gov/vocabulary/relators/edt), Perez, Gregorio Martinez. (Editor, http://id.loc.gov/vocabulary/relators/edt), Agrawal, Dharma P. (Editor, http://id.loc.gov/vocabulary/relators/edt), Gupta, Deepak. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2020.
Edition:1st ed. 2020.
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-22277-2
Table of Contents:
  • 1. Security Frameworks in Mobile Cloud Computing
  • 2. An investigation study of Privacy Preserving in Cloud
  • 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study
  • 4. A Novel AckIBE based Secure Cloud Data Management Framework
  • 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms
  • 6. Threats behind default configurations of network devices: local network attacks and their countermeasures
  • 7. Security and Privacy issues in Wireless Sensor and Body Area Networks
  • 8. Preventing Security and Privacy Attacks in WBANs
  • 9. Security in Underwater Wireless Sensor Networks
  • 10. Security Issues in Cognitive Radio Ad Hoc Networks
  • 11. Security and privacy in social networks: Data and Structural Anonymity
  • 12. SOI FinFET for Computer Networks and Cyber Security Systems
  • 13. Software Defined Networking: An Innovative Approach to Computer Networks
  • 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions
  • 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network
  • 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes
  • 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network
  • 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions
  • 19. Fog Computing: Applications and Secure Data Aggregation
  • 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment
  • 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network
  • 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study
  • 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems
  • 24. Investigation of Security Issues in Distributed Systems Monitoring
  • 25. An analysis of Provable Security Frameworks for RFID Security
  • 26. Computational Techniques for Real Time Credit Card Fraud Detection
  • 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective
  • 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction
  • 29. QKD protocols security between theory and engineering implementation
  • 30. Survey of Security and Privacy issues on Biometric system
  • 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics
  • 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces
  • 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators
  • 34. Recent Trends in Document Authentication using Text Steganography
  • 35. Machine Learning Based Intrusion Detection Techniques
  • 36. Feature Selection using a Machine Learning to Classify a Malware
  • 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection
  • 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools
  • 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.