ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Blockchain for Cybersecurity in Cyber-Physical Systems

دانلود کتاب بلاک چین برای امنیت سایبری در سیستم های فیزیکی-سایبری

Blockchain for Cybersecurity in Cyber-Physical Systems

مشخصات کتاب

Blockchain for Cybersecurity in Cyber-Physical Systems

ویرایش:  
نویسندگان: , ,   
سری: Advances in Information Security, 102 
ISBN (شابک) : 3031255054, 9783031255052 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 282
[283] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 7 Mb 

قیمت کتاب (تومان) : 45,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Blockchain for Cybersecurity in Cyber-Physical Systems به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب بلاک چین برای امنیت سایبری در سیستم های فیزیکی-سایبری نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب بلاک چین برای امنیت سایبری در سیستم های فیزیکی-سایبری




توضیحاتی درمورد کتاب به خارجی

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain technology is addressed as well as cybersecurity and cyber threat challenges and issues. This book also offers readers an excellent foundation on the fundamental concepts and principles of blockchain based cybersecurity for cyber-physical systems. It guides the reader through the core ideas with expert ease. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology, and maybe more so in the future. This book covers various case studies and applications of blockchain in various cyber-physical fields, such as smart cities, IoT, healthcare, manufacturing, online fraud, etc. This book is one of the first reference books covering the application of blockchain technology for cybersecurity in cyber-physical systems (CPS). Researchers working in the cybersecurity field and advanced-level students studying this field will find this book useful as a reference. Decision-makers, managers and professionals also working in this field will want to purchase this book.



فهرست مطالب

Preface
Contents
Editors and Contributors
	About the Editors
	Contributors
Cryptocurrency Wallets: Assessment and Security
	1 Introduction
		1.1 Crypto Wallets' Categories
		1.2 Available Digital Wallets
	2 Overview of Digital Wallets' Security
		2.1 Cryptocurrency Wallet's Backup
		2.2 Cryptocurrency Wallet's Encryption
		2.3 Cold Wallets as Another Solution
		2.4 Cryptocurrency Wallets and QR Code
	3 Cryptocurrency Wallets' Security Objectives
	4 Cryptocurrency Wallets' Adversary Model
	5 Vulnerabilities in Cryptocurrency Wallets
		5.1 Cryptocurrency Wallets' Attack Surface
		5.2 Digital Wallet's Common Threats
	6 Conclusion
	References
Cyber-Physical Systems Security: Analysis, Opportunities, Challenges, and Future Prospects
	1 Introduction
	2 Overview of the Cyber-Physical System (CPS)
		2.1 Principle of CPS Operations
		2.2 Cyber-Physical System and Internet of Things
		2.3 Cyber-Physical System Layers
		2.4 Cyber-Physical System Model Types and Components
		2.5 Challenges of Cyber-Physical System
	3 CPS Security, Threat, and Attacks
		3.1 Cyber-Physical System Security Issues
		3.2 Cybersecurity
		3.3 Cyber-Physical System Vulnerabilities
		3.4 Cyber Attacks
	4 Risk Assessment
		4.1 Asset Identification
		4.2 Threat Identification
		4.3 Vulnerability Identification
	5 Conclusion and Future Directions
	References
Cybersecurity-Based Blockchain for Cyber-Physical Systems: Challenges and Applications
	1 Introduction
	2 Research Methodology
	3 Blockchain (BC) Applications for Cyber-Physical Systems (CPS)
		3.1 Health Care
		3.2 Industrial Control Systems
		3.3 Transportation
		3.4 Smart Grid Systems
		3.5 Cybersecurity
	4 Blockchain-Enabled Cybersecurity in CPS
		4.1 Cyber-Physical Systems Security
		4.2 Data Authentication in Cyber-Physical Systems
	5 Limitations and Open Research Issues
	6 Conclusion
	References
Trust Management in Cyber-Physical Systems: Issues and Challenges
	1 Introduction
	2 Backgrounds
		2.1 Cyber Physical Systems
		2.2 Different Features of CPSs
	3 CPS: How Does It Operate?
		3.1 Principle of CPS Operation
		3.2 Integrated Technologies in CPS
	4 Security Issues in CPS
		4.1 Security Vulnerabilities in CPS
		4.2 Security Attacks in CPS
	5 Trust Management in CPS
		5.1 Trust: Definitions and Classifications
		5.2 Trust Management: How Does It Work?
		5.3 Trust Criteria
		5.4 Trust Management in CPS
	6 Blockchain-Based Trust Management in CPS
		6.1 Blockchain: Definition, Architecture, and Characteristics
		6.2 Principle of Operation of Blockchain
		6.3 Blockchain-Based Trust Management in CPS
	7 Conclusion and Future Works
	References
Blockchain-Based Authentication in IoT Environments: A Survey
	1 Introduction
		1.1 Problem Definition
		1.2 Research Contribution
		1.3 Chapter Layout
	2 Preliminaries
		2.1 Blockchain
		2.2 Authentication
		2.3 Authentication Attacks
	3 Methodology
	4 Blockchain and IoT Authentication
	5 Discussions
		5.1 Advantages of Using Blockchain in IoT Authentication
		5.2 Challenges in Using Blockchain in IoT Authentication
	6 Conclusions
	References
Blockchain Technology-Based Smart Cities: A Privacy-Preservation Review
	1 Introduction
	2 Theoretical Background
	3 Methodology
	4 Proposed Solutions
		4.1 User Identity Privacy
		4.2 Generated Data Protection
		4.3 Protection to the Data and to the Privacy of the Users
	5 Discussion
	6 Conclusion
	References
Security in Electronic Health Records System: Blockchain-Based Framework to Protect Data Integrity
	1 Introduction
	2 Blockchain Technology
	3 Related Work
	4 Proposed Framework
		4.1 Preliminary Studies
		4.2 Develop a blockchain-Based EHR Data-Sharing Prototype
		4.3 Implement a Web Application for Blockchain-Enabled EHR Data Sharing with Authentication
		4.4 A Case Study: Blockchain-Based Medical Image Sharing and Critical-Result Notification
	5 Discussion and Challenges
	6 Conclusion
	References
A Secure Data-Sharing Framework Based on Blockchain: Teleconsultation Use-Case
	1 Introduction
	2 Preliminaries
		2.1 Blockchain
		2.2 Distributed File Systems
		2.3 Homomorphic Encryption
		2.4 Broadcast Encryption
	3 Related Works
	4 Security Concerns
	5 A Secure Data-Sharing Framework Based on Blockchain
		5.1 Architecture
		5.2 Perception Layer
		5.3 Platform Layer
		5.4 Decentralized Applications Layer
			5.4.1 Distributed Storage Component
			5.4.2 Smart Contract Component
		5.5 Gateway Component
			5.5.1 Encryption Process
			5.5.2 Identification Process
			5.5.3 Query Process
			5.5.4 Decryption Process
		5.6 Query Engine Component
		5.7 Facade Layer
		5.8 Cryptology Algorithms
		5.9 Workflow
			5.9.1 Storage
			5.9.2 Data Owner Registration
			5.9.3 Request Access
			5.9.4 Data Sharing
	6 Security Evaluation
		6.1 Formal Description
			6.1.1 Proposed Framework
			6.1.2 Requirements
			6.1.3 Assumptions
		6.2 Formal Verification
			6.2.1 Integrity
			6.2.2 Confidentiality of Identification Information and Query
			6.2.3 Confidentiality of Metadata
			6.2.4 Confidentiality of Data (Access Control)
	7 A Teleconsultation Use Case of the Proposed Secure Data-Sharing Framework
		7.1 Discussion
	8 Conclusion
	References
Reputation-Based Consensus on a Secure Blockchain Network
	1 Introduction
	2 Problem Formulation
		2.1 Weight-Based Consensus Algorithm
	3 Proposed Reputation-Based Consensus Algorithm (RBCA)
	4 Blockchain Implementation
	5 Simulations
		5.1 Test 1: Agent 1 Shares Non-compliant Time-Varying States
		5.2 Test 2: Agent 1 Shares Non-compliant Constant States
	6 Conclusions
	References
AI and Blockchain for Cybersecurity in Cyber-Physical Systems: Challenges and Future Research Agenda
	1 Introduction
	2 Research Methodology
	3 Background Details
		3.1 AI-Framework for Cyber-Physical Security
		3.2 Network, Threat, and Design Goal of CPS
	4 Reported Work
		4.1 Graph-Based Approach
		4.2 Intrusion Detection Tree Approach
		4.3 Federated Learning for Cyberattack
		4.4 Deep Learning-Based Attack Detection
		4.5 Signature-Based Malicious Behavior Detection
	5 Comparative Analysis
	6 Future Prospective
	7 Conclusion
	References
Assessing the Predictability of Bitcoin Using AI and Statistical Models
	1 Introduction
		1.1 A Blockchain-Enabled Cyber-Physical System
	2 Literature Review
	3 Methodology and Experiment
		3.1 Models Used in the Study: LSTM and ARIMA
			3.1.1 Data and Variables
			3.1.2 Dependent Variable
			3.1.3 Independent Variables
			3.1.4 Feature Selection
			3.1.5 Unit Root Testing
	4 Results, Findings, Analysis, and Discussions
		4.1 Time Series Analysis
		4.2 Feature Engineering
		4.3 Feature Visualization
		4.4 Unit Root Result (Fig. 6)
		4.5 Time Series Prediction
		4.6 LSTM Results
		4.7 ARIMA Results
		4.8 Feature Significance
	5 Results Discussion
	6 Conclusion and Future Work
	Appendices
		Appendix A: Data Retrieval Sources
		Appendix B: Model Data Pre-processing
		Appendix C: ADF Test Scores
		Appendix D: Findings
	References
Blockchain-Based Novel Solution for Online Fraud Prevention and Detection
	1 Introduction
		1.1 Why Blockchain?
		1.2 Advantages of Using Blockchain
		1.3 Applications of Blockchain Banking Application
			1.3.1 Cyber Security
			1.3.2 Supply Chain Management
			1.3.3 Health Sector
			1.3.4 Governance
	2 Types of Online Fraud
		2.1 Types of Transactional Frauds
	3 Literature Review
		3.1 Types of Traditional Authentication Systems
	4 Proposed Solution
	5 Implementation
	6 Results and Analysis
	7 Limitations
	8 Conclusions
	References
Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain
	1 Introduction
	2 Related Work
		2.1 Blockchain Architecture
		2.2 Consensus Algorithm
		2.3 Identification of Problem
	3 Method
		3.1 Leader Selection
		3.2 Parameters/Inputs
		3.3 Neural Network Architecture
		3.4 Case Studies on Output and Dominant Feature Extraction
		3.5 Pattern Validation and Back to Stability
	4 Learning Methodology for Bias Pattern Validation
	5 Results
	6 Conclusion and Future Scope
	References




نظرات کاربران