Security and Risk Analysis for Intelligent Edge Computing, Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Автор: Jyoti Sekhar Banerjee, Siddhartha Bhatta Название: Intelligent cyber-physical systems security for industry 4.0 : ISBN: 1032148349 ISBN-13(EAN): 9781032148342 Издательство: Taylor&Francis Рейтинг: Цена: 16843.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents new cyber-physical security findings for Industry 4.0 using emerging technologies like Artificial Intelligence, Data Mining and Applied Mathematics which are the essential components for processing data, recognizing patterns, modelling new techniques and improving the advantages of the Data Science more.
Автор: Chang Wei, Wu Jie Название: Fog/Edge Computing For Security, Privacy, and Applications ISBN: 3030573303 ISBN-13(EAN): 9783030573300 Издательство: Springer Рейтинг: Цена: 20962.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Part I: Overview of Fog/Edge Computing
1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"
Khaldoon Alshouiliy (University of Cincinnati, USA)
Dharma Agrawal (University of Cincinnati, USA)
2. "An overview of the Edge Computing in Modern Digital Age"
Reinaldo Padilha Franзa (University of Campinas- UNICAMP, Brazil)
Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil)
Rangel Arthur (University of Campinas- UNICAMP, Brazil)
Yuzo Lano (University of Campinas- UNICAMP, Brazil)
Part II: Security in Fog/Edge Computing
3. "Secure Search and Storage Services in Fog/Edge Computing"
Qin Liu (Hunan University, China)
4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"
Abebe Diro (La Trobe University, Australia)
Abdun Mahmood (La Trobe University, Australia)
Naveen Chilamkurti (La Trobe University, Australia)
5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"
Ali Shoker (VORTEX Colab, Portugal)
Hussam Yactine (INESC TEC and Universidade do Minho, Portugal)
Part III: Privacy in Fog/Edge Computing
6. "Privacy Issues in Edge Computing"
Qi Xia (College of William and Mary, USA)
Zeyi Tao (College of William and Mary, USA)
Qun Li (College of William and Mary, USA)
7. "Privacy-preserving Edge Video Analytics"
Miao Hu (Sun Yat-sen University, China)
Yao Fu (Sun Yat-sen University, China)
Di Wu (Sun Yat-sen University, China)
Part IV: Architectural Design in Fog/Edge Computing
8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"
Nhu-Ngoc Dao (Sejong University, South Korea)
Ngoc-Thanh Dinh (Soongsil University, South Korea)
Quoc-Viet Pham (Pusan National University, South Korea)
Trung V. Phan (Technische Universitдt Chemnitz, Germany)
Sungrae Cho (Chung-Ang University, South Korea)
Torsten Braun (University of Bern, Switzerland)
9. "Security and Intelligent Management for Fog/Edge Computing Resources"
Jun Wu (Shanghai Jiao Tong University, China)
10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"
Zichuan Xu (Dalian University of Technology, China)
Weifa Liang (The Australian National University, Australia)
11. "Blockchain-based Security Services for Fog Computing"
Описание: This book constitutes the refereed post-conference proceedings of the 2nd International Conference on Edge Computing and IoT, ICECI 2021, held in December 2021 in Shenzhen, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Machine learning techniques are delivering a promising solution to the industry for building IoT systems and to make innovation at a rapid pace. The 12 full papers of ICECI 2021 were selected from 26 submissions and present results and ideas in the area of edge computing and IoT.
Автор: Chang Wei, Wu Jie Название: Fog/Edge Computing for Security, Privacy, and Applications ISBN: 3030573273 ISBN-13(EAN): 9783030573270 Издательство: Springer Цена: 20962.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Part I: Overview of Fog/Edge Computing
1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"
Khaldoon Alshouiliy (University of Cincinnati, USA)
Dharma Agrawal (University of Cincinnati, USA)
2. "An overview of the Edge Computing in Modern Digital Age"
Reinaldo Padilha Franзa (University of Campinas- UNICAMP, Brazil)
Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil)
Rangel Arthur (University of Campinas- UNICAMP, Brazil)
Yuzo Lano (University of Campinas- UNICAMP, Brazil)
Part II: Security in Fog/Edge Computing
3. "Secure Search and Storage Services in Fog/Edge Computing"
Qin Liu (Hunan University, China)
4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"
Abebe Diro (La Trobe University, Australia)
Abdun Mahmood (La Trobe University, Australia)
Naveen Chilamkurti (La Trobe University, Australia)
5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"
Ali Shoker (VORTEX Colab, Portugal)
Hussam Yactine (INESC TEC and Universidade do Minho, Portugal)
Part III: Privacy in Fog/Edge Computing
6. "Privacy Issues in Edge Computing"
Qi Xia (College of William and Mary, USA)
Zeyi Tao (College of William and Mary, USA)
Qun Li (College of William and Mary, USA)
7. "Privacy-preserving Edge Video Analytics"
Miao Hu (Sun Yat-sen University, China)
Yao Fu (Sun Yat-sen University, China)
Di Wu (Sun Yat-sen University, China)
Part IV: Architectural Design in Fog/Edge Computing
8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"
Nhu-Ngoc Dao (Sejong University, South Korea)
Ngoc-Thanh Dinh (Soongsil University, South Korea)
Quoc-Viet Pham (Pusan National University, South Korea)
Trung V. Phan (Technische Universitдt Chemnitz, Germany)
Sungrae Cho (Chung-Ang University, South Korea)
Torsten Braun (University of Bern, Switzerland)
9. "Security and Intelligent Management for Fog/Edge Computing Resources"
Jun Wu (Shanghai Jiao Tong University, China)
10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"
Zichuan Xu (Dalian University of Technology, China)
Weifa Liang (The Australian National University, Australia)
11. "Blockchain-based Security Services for Fog Computing"
Pramod Patil (Dr. Babasaheb Ambedkar Technological University, India
Laxman D. Netak (Dr. Babasaheb Ambedkar Technological University, India)
Sanjay U Waikar (Dr. Babasaheb Ambedkar Technological University, India)
Part V: Applications of Fog/Edge Computing
12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions"
G. S. S. Chalapathi (BITS Pilani, Pilani Campus, India, and The University of Melbourne, Australia)
Vinay Chamola (BITS Pilani, Pilani Campus,
Автор: Siegel, Carol A. , Sweeney, Mark Название: Cyber Strategy ISBN: 0367458179 ISBN-13(EAN): 9780367458171 Издательство: Taylor&Francis Рейтинг: Цена: 16078.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cyber Strategy Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency Strategy. The book discusses all the steps required from conception of the plan from pre-planning (mission/vision, principles, strategic objectives, new initiatives derivation).
Описание: Chapter 1. Self-optimization and Resource-utilization SDN Framework for HetNets.- Chapter 2. Brain tumor detection using machine learning in gui.- Chapter 3. Modeling of solar emergency system in power station to mitigate blackout.- Chapter 4. Modelling And Simulation Of Permanent Magnet Syn- chronous Motor For Performance Enhancement Using ANSYS Maxwell.- Chapter 5. Assessment on the Adequacy of Dual Current Supply in CMOS Dual Differential Amplifier.- Chapter 6. File Authentication Ownership using Blockchain.- Chapter 7. Image Retrieval Based on Texture using Local Binary Pattern and Local Phase Quantization.- Chapter 8. Comparative study of human activity recognition on sensory data using machine learning and deep learning.- Chapter 9. Segmentation of Retinal Blood Vessel using an Algorithm-based Gamma Distribution of Matched filter.- Chapter 10. Phishing Prevention Techniques: Past, Present and Future.
Описание: This book gathers selected papers presented at the International Conference on Deep Learning, Computing and Intelligence (ICDCI 2021), organized by Department of Information Technology, SRM Institute of Science and Technology, Chennai, India, during January 7–8, 2021. The conference is sponsored by Scheme for Promotion of Academic and Research Collaboration (SPARC) in association with University of California, UC Davis and SRM Institute of Science and Technology. The book presents original research in the field of deep learning algorithms and medical imaging systems, focusing to address issues and developments in recent approaches, algorithms, mechanisms, and developments in medical imaging.
Описание: This book constitutes the refereed proceedings of the 5th International Conference on Emerging Technologies in Computer Engineering, ICETCE 2021, held in Jaipur, India, in February 2022. The 40 revised full papers along with 20 short papers presented were carefully reviewed and selected from 235 submissions. The papers are organized according to the following topical headings: cognitive computing; Internet of Things (IoT); machine learning and applications; soft computing; data science and big data analytics; blockchain and cyber security.
Описание: This book investigates intelligent network resource management for IoV, with the objective of maximizing the communication and computing performance of vehicle users. Focusing on two representative use cases in IoV, i.e., safety message broadcast and autonomous driving, the authors propose link-layer protocol design and application-layer computing task scheduling to achieve the objective given the unique characteristics and requirements of IoV. In particular, this book illustrates the challenges of resource management for IoV due to network dynamics, such as time-varying traffic intensity and vehicle mobility, and presents intelligent resource management solutions to adapt to the network dynamics. The Internet of Vehicles (IoV) enables vehicle-to-everything connectivity and supports a variety of applications for vehicles on the road. Intelligent resource management is critical for satisfying demanding communication and computing requirements on IoV, while the highly dynamic network environments pose challenges to the design of resource management schemes. This book provides insights into the significance of adaptive resource management in improving the performance of IoV. The customized communication protocol and computing scheduling scheme are designed accordingly by taking the network dynamics information as an integral design factor. Moreover, the decentralized designs of the proposed solutions guarantee low signaling overhead and high scalability. A comprehensive literature review summarizing recent resource management schemes in IoV, followed by the customized design of communication and computing solutions for the two IoV use cases is included which can serve as a useful reference for professionals from both academia and industry in the area of IoV and resource management. Researchers working within this field and computer science and electrical engineering students will find this book useful as well.
Автор: Maciej Grzenda; Ali Ismail Awad; Janusz Furtak; Ja Название: Advances in Network Systems ISBN: 3319443526 ISBN-13(EAN): 9783319443522 Издательство: Springer Рейтинг: Цена: 27950.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.
Автор: Tanveer Название: Machine Intelligence and Signal Analysis ISBN: 9811309221 ISBN-13(EAN): 9789811309229 Издательство: Springer Рейтинг: Цена: 27950.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: and covers the topics of signal analysis such as: biomedical signals including electroencephalogram (EEG), magnetoencephalography (MEG), electrocardiogram (ECG) and electromyogram (EMG) as well as other signals such as speech signals, communication signals, vibration signals, image, and video.
Автор: Miguel, Jorge Название: Intelligent Data Analysis for e-Learning ISBN: 0128045353 ISBN-13(EAN): 9780128045350 Издательство: Elsevier Science Рейтинг: Цена: 15159.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements.
This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time.
The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems.
Indexing: The books of this series are submitted to EI-Compendex and SCOPUS
Provides guidelines for anomaly detection, security analysis, and trustworthiness of data processing
Incorporates state-of-the-art, multidisciplinary research on online collaborative learning, social networks, information security, learning management systems, and trustworthiness prediction
Proposes a parallel processing approach that decreases the cost of expensive data processing
Offers strategies for ensuring against unfair and dishonest assessments
Demonstrates solutions using a real-life e-Learning context
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru