دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Kumar. Gautam(Editor), Saini. Dinesh Kumar(Editor), Cuong. Nguyen Ha Huy(Editor) سری: Artificial intelligence (AI). Elementary to advanced practices ISBN (شابک) : 9780367816438, 036740883X ناشر: CRC Press سال نشر: 2020;2021 تعداد صفحات: 231 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 10 مگابایت
در صورت تبدیل فایل کتاب Cyber defense mechanisms security, privacy, and challenges به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مکانیسم های دفاع سایبری امنیت، حریم خصوصی و چالش ها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب تکامل مسائل امنیتی و حریم خصوصی را مورد بحث قرار می
دهد و ابزارها، تکنیک ها و راه حل های فنی مرتبط را در یک منبع
واحد آورده است.
این کتاب خوانندگان را به سفری برای درک مسائل امنیتی و
راهحلهای احتمالی شامل تهدیدها، حملات و مکانیسمهای دفاعی
مختلف میبرد که شامل اینترنت اشیا، محاسبات ابری، دادههای بزرگ،
رمزنگاری سبک وزن برای بلاکچین، و تکنیک های فشرده داده و اینکه
چگونه می توان آن را برای کاربردهای مختلف برای استفاده عمومی و
خاص اعمال کرد.
دانشجویان، محققان و کسانی که در این صنعت کار می کنند، فارغ
التحصیلان و فارغ التحصیلان و کسانی که در این صنعت کار می کنند،
درک و استفاده از این کتاب برای برنامه های امنیتی و مسائل مربوط
به حریم خصوصی آسان است.
This book discusses the evolution of security and privacy
issues and brings related technological tools, techniques, and
solutions into one single source.
The book will take readers on a journey to understanding the
security issues and possible solutions involving various
threats, attacks, and defense mechanisms, which include IoT,
cloud computing, Big Data, lightweight cryptography for
blockchain, and data-intensive techniques, and how it can be
applied to various applications for general and specific
use.
Graduate and postgraduate students, researchers, and those
working in this industry will find this book easy to understand
and use for security applications and privacy issues.
Cover Half Title Series Page Title Page Copyright Page Table of Contents Preface Editors Contributors Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies 1.1 Introduction 1.2 History of Security Breaches 1.3 Common Security Threats 1.3.1 Malware 1.3.2 Phishing 1.3.3 Spear Phishing 1.3.4 “Man in the Middle” (MitM) Attack 1.3.5 Trojans 1.3.6 Ransomware 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) 1.3.8 Attacks on IoT Devices 1.3.9 Data Breaches 1.3.10 Malware on Mobile Apps 1.4 Security Challenges in Modern Day 1.4.1 Cloud Computing 1.4.2 Social Media 1.4.3 Smart Phones 1.4.4 General Data Protection Regulations (GDPR) 1.4.5 Attacks Based on Machine Learning and AI 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems 1.4.7 Switching to DevOps 1.4.8 Biometric Authentication 1.4.9 Fileless Malware 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) 1.5.1 How an APT Attack Works 1.5.2 Some Instances of APTs 1.5.3 Characteristics of APTs 1.6 Prevention Measures 1.6.1 Identify the Threats 1.6.2 Beware of Cybercrimes 1.6.3 Observe All Stakeholders 1.6.4 Usage of Two-Factor Authentication 1.6.5 Conduct Regular Audits 1.6.6 Draft a Credit Sign-Off Policy 1.6.7 Protect Vital Data 1.6.8 Perform Risk Assessments 1.6.9 Insure against Cybercrime 1.6.10 Gather In-Depth Knowledge about Risk Factors 1.7 Threat Modeling 1.8 Role of a Threat Analyst 1.9 Summary References Chapter 2 Defense against the Survivability to Network Strategies 2.1 Introduction 2.2 Survivability Network Architecture—SONET and Self-Healing Ring Transportation 2.3 Single-Access Optical Network Ring Architecture 2.4 Multiaccess Optical Network Ring Architecture 2.5 Channel Demand Routing Ring Architecture 2.6 Result 2.7 Conclusion References Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems 3.1 Introduction 3.2 Background Knowledge of CPS 3.3 Application Areas of Cyber-Physical System (CPS) 3.4 Philosophical Issues of CPS 3.5 Principle of CPS Operation 3.6 Architecture of CPS 3.6.1 Physical Layer 3.6.2 Data Link Layer 3.6.3 Network Layer 3.6.4 Transport Layer 3.6.5 Session Layer 3.6.6 Presentation Layer 3.6.7 Application Layer 3.7 Self-Adaptive Patterns 3.7.1 Synthesis Utilized Pattern 3.7.2 Synthesis Command Patterns 3.7.3 Collect Organized Patterns 3.8 Security Threats of CPS 3.9 Attacks on CPS 3.10 Attacks and Its Consequences 3.11 Adversaries’ Characteristics 3.12 Conclusion References Chapter 4 Secure Channel Allocation in Cognitive Radio–Wireless Sensor Networks 4.1 Introduction 4.2 Related Works 4.3 System Model 4.4 Common Attacks in CR-WSN 4.4.1 Replay Attack 4.4.2 Node-Targeted Attack 4.4.3 Power Consumption Attack 4.4.4 Location Privacy 4.5 Performance Evaluation 4.5.1 Countermeasures in CR-WSN 4.6 Conclusion and Future Work References Chapter 5 Security Issues in IoT Networks 5.1 Introduction 5.2 Challenges for IoT Network 5.2.1 The Most Important Challenges in IoT Network 5.2.1.1 Schema Processing 5.2.1.2 Speed 5.2.1.3 The Value 5.2.1.4 The Security 5.3 Elements for the Internet of Things (IoT) 5.4 Cases and Scenarios for IoT Network 5.4.1 Clustering 5.4.2 Tracking 5.4.3 Tactical Networks and High Dynamic Network 5.5 The Vision of Internet of Things (IoT) 5.6 Software-Defined IoT 5.7 IoT Architecture 5.8 Algorithm for Internet of Things (IoT) 5.9 Business Context of the IoT 5.10 IoT Device Information Collection Process 5.11 Introduction to IoT Security 5.12 D evelopment of IoT Security Mechanisms 5.13 Security Attacks in IoT 5.14 IoT Security Challenges 5.14.1 IoT Security Risks and Challenges 5.14.2 IoT Security Requirements 5.15 Conclusion References Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario 6.1 IoT Ecosystem History 6.2 IoT Ecosystem 6.2.1 Building an IoT Ecosystem 6.3 Challenges in Building an Ecosystem 6.4 IoT Ecosystem Implications 6.5 IoT Security Implications 6.6 Current IoT Security Scenario and Trends 6.6.1 Why These Are Not Enough 6.6.2 The Ideal Security System 6.7 A Solution—Blockchain Technology 6.7.1 Implementing Blockchain in an IoT Ecosystem 6.8 Conclusion References Chapter 7 Design Principles and Privacy in Cloud Computing 7.1 Introduction 7.1.1 Evolution of Cloud Computing 7.1.2 Applications of Cloud Computing in Various Domains 7.1.3 Generalized Architecture for Cloud Computing 7.1.4 Design Principles in Cloud Computing 7.1.5 Privacy Issues in Cloud Computing 7.1.6 Chapter Outline 7.2 Security Requirements and Attacks in Cloud Computing 7.2.1 Threat Model 7.2.2 Security Requirements in Cloud Computing 7.2.3 Security Attacks in Cloud Computing 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing 7.3.1 Key Management 7.3.2 User Authentication/Device Authentication 7.3.3 Access Control/User Access Control 7.3.4 Intrusion Detection 7.3.5 Privacy Preservation 7.4 Challenges and Future Research Directions 7.4.1 Design of Lightweight Security Protocols 7.4.2 Securing Data Mining Methods 7.4.3 Granular Auditing 7.4.4 Blockchain-Based Decentralized Mechanisms 7.5 Conclusion Bibliography Chapter 8 Big Data Analysis on Smart Tools and Techniques 8.1 Introduction 8.2 Big Data Challenges 8.3 Big Data Analysis Techniques and Tools 8.3.1 Data Mining 8.3.2 Web Mining 8.3.3 Visualization Methods 8.3.4 Machine Learning 8.3.5 Multilayer Perceptron (MLP) 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) 8.3.7 Support Vector Machine (SVM) 8.3.8 Optimization Methods 8.3.9 Stochastic Optimization 8.3.10 Deterministic Optimization 8.4 Related Work 8.5 Discussion and Conclusion 8.5.1 Discussion 8.5.2 Conclusion References Chapter 9 Lightweight Security Protocols for Blockchain Technology 9.1 Introduction 9.2 Blockchain Technology Design Space 9.3 Consensus 9.3.1 Distinct Features of Blockchain Distributed Architecture 9.4 Practical Applications of Blockchain 9.5 Advantages and Disadvantages of Blockchain 9.5.1 Advantages 9.5.2 Disadvantages 9.6 Limitations and Drawbacks of Blockchain 9.7 Comparative Study on Authentication Protocols for Blockchain Technology 9.7.1 Comparison of Security and Functionality Features 9.7.2 Comparison of Communication Costs 9.7.3 Comparison of Computation Costs 9.8 Deployment and Implementation of Testbeds for Blockchain 9.9 Conclusion Acknowledgments Bibliography Chapter 10 Privacy and Challenges to Data-Intensive Techniques 10.1 Introduction 10.2 Advantages of Cybersecurity 10.3 Approach and Workflow 10.3.1 Common Steps in Cybersecurity 10.3.2 Set Up Your Risk Management Regime 10.4 Cybersecurity Principles and Goals 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution 10.5.1 Confidentiality 10.5.1.1 Tools for Confidentiality 10.5.2 Integrity 10.5.2.1 Tools for Integrity 10.5.3 Availability 10.5.3.1 Tools of Availability 10.5.4 Challenges of Cybersecurity 10.5.5 Data Security Consideration 10.6 Privacy Preservation 10.6.1 Privacy in Cybersecurity 10.6.2 Data-Intensive Technology 10.7 Challenges in Data-Intensive Techniques 10.8 Cybersecurity to Data-Intensive Techniques 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques 10.9 Conclusion References Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine 11.1 Introduction 11.2 Related Works 11.3 Nomenclature 11.4 Formulation of Mathematical Model and Assumptions 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) 1 11.6 Basic Reproduction Number and Equilibrium 11.7 Existence and Stability Analysis 11.8 Conclusion References Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method 12.1 Introduction 12.2 Purpose and Goal of the Research 12.3 Relationship between the AI/Human Players and the System 12.4 Game-Related Information 12.4.1 Game Rules 12.4.2 Character Information 12.5 Approach 12.5.1 Rule-Based Method Structure 12.5.2 Rule Analysis of the Fighting Game Player 12.5.3 Methodology 12.6 Experiment 12.6.1 Environment and Settings 12.6.2 Results and Discussions 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player 12.7 C onclusion References Chapter 13 Web-Based Smart Agriculture System 13.1 Introduction 13.2 Major Factors of Smart Agriculture 13.2.1 Increase in Agriculture Productivity 13.2.2 Minimizing Agriculture Greenhouse Gases 13.3 Ancient Farming Technology and Machinery 13.3.1 Old Techniques 13.3.2 Old Machinery 13.4 Drawbacks of Old Techniques 13.5 Tools Used For Smart Agriculture 13.5.1 GPS Locator 13.5.2 Sensors 13.5.3 Remote Sensing 13.5.4 Automatic Irrigation and Watering 13.5.5 Drones 13.5.6 Driverless Tractor 13.6 New Methods Used For Smart Agriculture 13.7 Land Use System: Agroforestry 13.8 Smart Technology Used For Farming 13.8.1 IoT in Agriculture 13.8.2 Cloud Computing 13.8.3 Robots 13.8.4 Genetic Algorithm in Smart Farming 13.9 Security Challenges 13.10 Conclusion References Index