دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Yassine Maleh, Mamoun Alazab, Imed Romdhani سری: Advances in Information Security, 102 ISBN (شابک) : 3031255054, 9783031255052 ناشر: Springer سال نشر: 2023 تعداد صفحات: 282 [283] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 7 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Blockchain for Cybersecurity in Cyber-Physical Systems به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب بلاک چین برای امنیت سایبری در سیستم های فیزیکی-سایبری نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain technology is addressed as well as cybersecurity and cyber threat challenges and issues. This book also offers readers an excellent foundation on the fundamental concepts and principles of blockchain based cybersecurity for cyber-physical systems. It guides the reader through the core ideas with expert ease. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology, and maybe more so in the future. This book covers various case studies and applications of blockchain in various cyber-physical fields, such as smart cities, IoT, healthcare, manufacturing, online fraud, etc. This book is one of the first reference books covering the application of blockchain technology for cybersecurity in cyber-physical systems (CPS). Researchers working in the cybersecurity field and advanced-level students studying this field will find this book useful as a reference. Decision-makers, managers and professionals also working in this field will want to purchase this book.
Preface Contents Editors and Contributors About the Editors Contributors Cryptocurrency Wallets: Assessment and Security 1 Introduction 1.1 Crypto Wallets' Categories 1.2 Available Digital Wallets 2 Overview of Digital Wallets' Security 2.1 Cryptocurrency Wallet's Backup 2.2 Cryptocurrency Wallet's Encryption 2.3 Cold Wallets as Another Solution 2.4 Cryptocurrency Wallets and QR Code 3 Cryptocurrency Wallets' Security Objectives 4 Cryptocurrency Wallets' Adversary Model 5 Vulnerabilities in Cryptocurrency Wallets 5.1 Cryptocurrency Wallets' Attack Surface 5.2 Digital Wallet's Common Threats 6 Conclusion References Cyber-Physical Systems Security: Analysis, Opportunities, Challenges, and Future Prospects 1 Introduction 2 Overview of the Cyber-Physical System (CPS) 2.1 Principle of CPS Operations 2.2 Cyber-Physical System and Internet of Things 2.3 Cyber-Physical System Layers 2.4 Cyber-Physical System Model Types and Components 2.5 Challenges of Cyber-Physical System 3 CPS Security, Threat, and Attacks 3.1 Cyber-Physical System Security Issues 3.2 Cybersecurity 3.3 Cyber-Physical System Vulnerabilities 3.4 Cyber Attacks 4 Risk Assessment 4.1 Asset Identification 4.2 Threat Identification 4.3 Vulnerability Identification 5 Conclusion and Future Directions References Cybersecurity-Based Blockchain for Cyber-Physical Systems: Challenges and Applications 1 Introduction 2 Research Methodology 3 Blockchain (BC) Applications for Cyber-Physical Systems (CPS) 3.1 Health Care 3.2 Industrial Control Systems 3.3 Transportation 3.4 Smart Grid Systems 3.5 Cybersecurity 4 Blockchain-Enabled Cybersecurity in CPS 4.1 Cyber-Physical Systems Security 4.2 Data Authentication in Cyber-Physical Systems 5 Limitations and Open Research Issues 6 Conclusion References Trust Management in Cyber-Physical Systems: Issues and Challenges 1 Introduction 2 Backgrounds 2.1 Cyber Physical Systems 2.2 Different Features of CPSs 3 CPS: How Does It Operate? 3.1 Principle of CPS Operation 3.2 Integrated Technologies in CPS 4 Security Issues in CPS 4.1 Security Vulnerabilities in CPS 4.2 Security Attacks in CPS 5 Trust Management in CPS 5.1 Trust: Definitions and Classifications 5.2 Trust Management: How Does It Work? 5.3 Trust Criteria 5.4 Trust Management in CPS 6 Blockchain-Based Trust Management in CPS 6.1 Blockchain: Definition, Architecture, and Characteristics 6.2 Principle of Operation of Blockchain 6.3 Blockchain-Based Trust Management in CPS 7 Conclusion and Future Works References Blockchain-Based Authentication in IoT Environments: A Survey 1 Introduction 1.1 Problem Definition 1.2 Research Contribution 1.3 Chapter Layout 2 Preliminaries 2.1 Blockchain 2.2 Authentication 2.3 Authentication Attacks 3 Methodology 4 Blockchain and IoT Authentication 5 Discussions 5.1 Advantages of Using Blockchain in IoT Authentication 5.2 Challenges in Using Blockchain in IoT Authentication 6 Conclusions References Blockchain Technology-Based Smart Cities: A Privacy-Preservation Review 1 Introduction 2 Theoretical Background 3 Methodology 4 Proposed Solutions 4.1 User Identity Privacy 4.2 Generated Data Protection 4.3 Protection to the Data and to the Privacy of the Users 5 Discussion 6 Conclusion References Security in Electronic Health Records System: Blockchain-Based Framework to Protect Data Integrity 1 Introduction 2 Blockchain Technology 3 Related Work 4 Proposed Framework 4.1 Preliminary Studies 4.2 Develop a blockchain-Based EHR Data-Sharing Prototype 4.3 Implement a Web Application for Blockchain-Enabled EHR Data Sharing with Authentication 4.4 A Case Study: Blockchain-Based Medical Image Sharing and Critical-Result Notification 5 Discussion and Challenges 6 Conclusion References A Secure Data-Sharing Framework Based on Blockchain: Teleconsultation Use-Case 1 Introduction 2 Preliminaries 2.1 Blockchain 2.2 Distributed File Systems 2.3 Homomorphic Encryption 2.4 Broadcast Encryption 3 Related Works 4 Security Concerns 5 A Secure Data-Sharing Framework Based on Blockchain 5.1 Architecture 5.2 Perception Layer 5.3 Platform Layer 5.4 Decentralized Applications Layer 5.4.1 Distributed Storage Component 5.4.2 Smart Contract Component 5.5 Gateway Component 5.5.1 Encryption Process 5.5.2 Identification Process 5.5.3 Query Process 5.5.4 Decryption Process 5.6 Query Engine Component 5.7 Facade Layer 5.8 Cryptology Algorithms 5.9 Workflow 5.9.1 Storage 5.9.2 Data Owner Registration 5.9.3 Request Access 5.9.4 Data Sharing 6 Security Evaluation 6.1 Formal Description 6.1.1 Proposed Framework 6.1.2 Requirements 6.1.3 Assumptions 6.2 Formal Verification 6.2.1 Integrity 6.2.2 Confidentiality of Identification Information and Query 6.2.3 Confidentiality of Metadata 6.2.4 Confidentiality of Data (Access Control) 7 A Teleconsultation Use Case of the Proposed Secure Data-Sharing Framework 7.1 Discussion 8 Conclusion References Reputation-Based Consensus on a Secure Blockchain Network 1 Introduction 2 Problem Formulation 2.1 Weight-Based Consensus Algorithm 3 Proposed Reputation-Based Consensus Algorithm (RBCA) 4 Blockchain Implementation 5 Simulations 5.1 Test 1: Agent 1 Shares Non-compliant Time-Varying States 5.2 Test 2: Agent 1 Shares Non-compliant Constant States 6 Conclusions References AI and Blockchain for Cybersecurity in Cyber-Physical Systems: Challenges and Future Research Agenda 1 Introduction 2 Research Methodology 3 Background Details 3.1 AI-Framework for Cyber-Physical Security 3.2 Network, Threat, and Design Goal of CPS 4 Reported Work 4.1 Graph-Based Approach 4.2 Intrusion Detection Tree Approach 4.3 Federated Learning for Cyberattack 4.4 Deep Learning-Based Attack Detection 4.5 Signature-Based Malicious Behavior Detection 5 Comparative Analysis 6 Future Prospective 7 Conclusion References Assessing the Predictability of Bitcoin Using AI and Statistical Models 1 Introduction 1.1 A Blockchain-Enabled Cyber-Physical System 2 Literature Review 3 Methodology and Experiment 3.1 Models Used in the Study: LSTM and ARIMA 3.1.1 Data and Variables 3.1.2 Dependent Variable 3.1.3 Independent Variables 3.1.4 Feature Selection 3.1.5 Unit Root Testing 4 Results, Findings, Analysis, and Discussions 4.1 Time Series Analysis 4.2 Feature Engineering 4.3 Feature Visualization 4.4 Unit Root Result (Fig. 6) 4.5 Time Series Prediction 4.6 LSTM Results 4.7 ARIMA Results 4.8 Feature Significance 5 Results Discussion 6 Conclusion and Future Work Appendices Appendix A: Data Retrieval Sources Appendix B: Model Data Pre-processing Appendix C: ADF Test Scores Appendix D: Findings References Blockchain-Based Novel Solution for Online Fraud Prevention and Detection 1 Introduction 1.1 Why Blockchain? 1.2 Advantages of Using Blockchain 1.3 Applications of Blockchain Banking Application 1.3.1 Cyber Security 1.3.2 Supply Chain Management 1.3.3 Health Sector 1.3.4 Governance 2 Types of Online Fraud 2.1 Types of Transactional Frauds 3 Literature Review 3.1 Types of Traditional Authentication Systems 4 Proposed Solution 5 Implementation 6 Results and Analysis 7 Limitations 8 Conclusions References Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain 1 Introduction 2 Related Work 2.1 Blockchain Architecture 2.2 Consensus Algorithm 2.3 Identification of Problem 3 Method 3.1 Leader Selection 3.2 Parameters/Inputs 3.3 Neural Network Architecture 3.4 Case Studies on Output and Dominant Feature Extraction 3.5 Pattern Validation and Back to Stability 4 Learning Methodology for Bias Pattern Validation 5 Results 6 Conclusion and Future Scope References