Intrusion Detection and Prevention for Mobile Ecosystems

Intrusion Detection and Prevention for Mobile Ecosystems
Author: Georgios Kambourakis
Publisher: CRC Press
Total Pages: 477
Release: 2017-09-06
Genre: Computers
ISBN: 131530581X

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.

Intrusion Detection and Prevention for Mobile Ecosystems

Intrusion Detection and Prevention for Mobile Ecosystems
Author: Georgios Kambourakis
Publisher: CRC Press
Total Pages: 559
Release: 2017-09-06
Genre: Computers
ISBN: 1315305828

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.

Advances in Parallel Computing Algorithms, Tools and Paradigms

Advances in Parallel Computing Algorithms, Tools and Paradigms
Author: D.J. Hemanth
Publisher: IOS Press
Total Pages: 670
Release: 2022-11-23
Genre: Computers
ISBN: 1643683152

Recent developments in parallel computing for various fields of application are providing improved solutions for handling data. These newer, innovative ideas offer the technical support necessary to enhance intellectual decisions, while also dealing more efficiently with the huge volumes of data currently involved. This book presents the proceedings of ICAPTA 2022, the International Conference on Advances in Parallel Computing Technologies and Applications, hosted as a virtual conference from Bangalore, India, on 27 and 28 January 2022. The aim of the conference was to provide a forum for the sharing of knowledge about various aspects of parallel computing in communications systems and networking, including cloud and virtualization solutions, management technologies and vertical application areas. The conference also provided a premier platform for scientists, researchers, practitioners and academicians to present and discuss their most recent innovations, trends and concerns, as well as the practical challenges encountered in this field. More than 300 submissions were received for the conference, from which the 91 full-length papers presented here were accepted after review by a panel of subject experts. Topics covered include parallel computing in communication, machine learning intelligence for parallel computing and parallel computing for software services in theoretical and practical aspects. Providing an overview of recent developments in the field, the book will be of interest to all those whose work involves the use of parallel computing technologies.

Empirical Research for Software Security

Empirical Research for Software Security
Author: Lotfi ben Othmane
Publisher: CRC Press
Total Pages: 323
Release: 2017-11-28
Genre: Computers
ISBN: 1498776426

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm

Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm
Author: Sheng-Lung Peng
Publisher: Springer Nature
Total Pages: 636
Release: 2019-11-13
Genre: Technology & Engineering
ISBN: 3030335968

This book discusses the evolution of future-generation technologies through the Internet of things, bringing together all the related technologies on a single platform to offer valuable insights for undergraduate and postgraduate students, researchers, academics and industry practitioners. The book uses data, network engineering and intelligent decision- support system-by-design principles to design a reliable IoT-enabled ecosystem and to implement cyber-physical pervasive infrastructure solutions. It takes readers on a journey that begins with understanding the insight paradigm of IoT-enabled technologies and how it can be applied. It walks readers through engaging with real-time challenges and building a safe infrastructure for IoT-based, future-generation technologies. The book helps researchers and practitioners to understand the design architecture through IoT and the state of the art in IoT countermeasures. It also highlights the differences between heterogeneous platforms in IoT-enabled infrastructure and traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on functional frameworks for IoT, object identification, IoT domain model, RFID technology, wearable sensors, WBAN, IoT semantics, knowledge extraction, and security and privacy issues in IoT-based ecosystems. Written by leading international experts, it explores IoT-enabled insight paradigms, which are utilized for the future benefit of humans. It also includes references to numerous works. Divided into stand-alone chapters, this highly readable book is intended for specialists, researchers, graduate students, designers, experts, and engineers involved in research on healthcare-related issues.

Testing Software and Systems

Testing Software and Systems
Author: Valentina Casola
Publisher: Springer Nature
Total Pages: 321
Release: 2020-12-02
Genre: Computers
ISBN: 3030648818

This book constitutes the refereed proceedings of the 32nd IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2020, which was supposed to be held in Naples, Italy, in December 2020, but was held virtually due to the COVID-19 pandemic. The 17 regular papers and 4 short papers presented were carefully reviewed and selected from 43 submissions. ICTSS is a series of international conferences addressing the conceptual, theoretic, and practical problems of testing software systems, including communication protocols, services, distributed platforms, middleware, embedded and cyber-physical systems, and security infrastructures. The papers are organized in the topical sections named: model-based testing; security testing; testing methods and applications; testing methods and automation; and short contributions.

The Cloud Security Ecosystem

The Cloud Security Ecosystem
Author: Raymond Choo
Publisher: Syngress
Total Pages: 571
Release: 2015-06-01
Genre: Computers
ISBN: 0128017805

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. - Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field - Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples - Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics - Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts

Handbook of Research on Cyber Crime and Information Privacy

Handbook of Research on Cyber Crime and Information Privacy
Author: Cruz-Cunha, Maria Manuela
Publisher: IGI Global
Total Pages: 753
Release: 2020-08-21
Genre: Computers
ISBN: 1799857298

In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.

Security and Privacy in the Internet of Things

Security and Privacy in the Internet of Things
Author: Ali Ismail Awad
Publisher: John Wiley & Sons
Total Pages: 340
Release: 2021-12-29
Genre: Technology & Engineering
ISBN: 1119607744

SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things: Discusses a broad range of IoT attacks and defense mechanisms Examines IoT security and privacy protocols and approaches Covers both the logical and physical security of IoT devices Addresses IoT security through network traffic modeling Describes privacy preserving techniques in smart cities Explores current threat and vulnerability analyses Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.