Advances in Swarm Intelligence

Advances in Swarm Intelligence
Author: Ying Tan
Publisher: Springer
Total Pages: 462
Release: 2019-07-18
Genre: Computers
ISBN: 303026369X

The two-volume set of LNCS 11655 and 11656 constitutes the proceedings of the 10th International Conference on Advances in Swarm Intelligence, ICSI 2019, held in Chiang Mai, Thailand, in June 2019. The total of 82 papers presented in these volumes was carefully reviewed and selected from 179 submissions. The papers were organized in topical sections as follows: Part I: Novel methods and algorithms for optimization; particle swarm optimization; ant colony optimization; fireworks algorithms and brain storm optimization; swarm intelligence algorithms and improvements; genetic algorithm and differential evolution; swarm robotics. Part II: Multi-agent system; multi-objective optimization; neural networks; machine learning; identification and recognition; social computing and knowledge graph; service quality and energy management.

Critical Infrastructure Security

Critical Infrastructure Security
Author: Soledad Antelada Toledano
Publisher: Packt Publishing Ltd
Total Pages: 270
Release: 2024-05-24
Genre: Computers
ISBN: 1837633568

Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructure Key Features Gain an overview of the fundamental principles of cybersecurity in critical infrastructure Explore real-world case studies that provide a more exciting learning experience, increasing retention Bridge the knowledge gap associated with IT/OT convergence through practical examples Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionDiscover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure – the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public’s health and safety – with this guide to understanding cybersecurity principles. From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You’ll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches. From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you’ll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure. By the end of this book, you’ll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure. What you will learn Understand critical infrastructure and its importance to a nation Analyze the vulnerabilities in critical infrastructure systems Acquire knowledge of the most common types of cyberattacks on critical infrastructure Implement techniques and strategies for protecting critical infrastructure from cyber threats Develop technical insights into significant cyber attacks from the past decade Discover emerging trends and technologies that could impact critical infrastructure security Explore expert predictions about cyber threats and how they may evolve in the coming years Who this book is for This book is for SOC analysts, security analysts, operational technology (OT) engineers, and operators seeking to improve the cybersecurity posture of their networks. Knowledge of IT and OT systems, along with basic networking and system administration skills, will significantly enhance comprehension. An awareness of current cybersecurity trends, emerging technologies, and the legal framework surrounding critical infrastructure is beneficial.

Foundations and Practice of Security

Foundations and Practice of Security
Author: Esma Aïmeur
Publisher: Springer Nature
Total Pages: 422
Release: 2022-06-14
Genre: Computers
ISBN: 3031081471

This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021. The 18 full papers and 9 short paper presented in this book were carefully reviewed and selected from 62 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design. Chapters “A Quantile-based Watermarking Approach for Distortion Minimization”, “Choosing Wordlists for Password Guessing: An Adaptive Multi-Armed Bandit Approach” and “A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Advances in Cyber Security

Advances in Cyber Security
Author: Nibras Abdullah
Publisher: Springer Nature
Total Pages: 611
Release: 2021-12-02
Genre: Computers
ISBN: 9811680590

This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.

Handbook of Research on Intrusion Detection Systems

Handbook of Research on Intrusion Detection Systems
Author: Gupta, Brij B.
Publisher: IGI Global
Total Pages: 407
Release: 2020-02-07
Genre: Computers
ISBN: 1799822435

Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Blockchain Technology

Blockchain Technology
Author: E. Golden Julie
Publisher: CRC Press
Total Pages: 255
Release: 2020-11-09
Genre: Computers
ISBN: 1000216756

This book presents a detailed exploration of adaption and implementation, as well as a 360-degree view spectrum of blockchain technologies in real-world business applications. Blockchain is gaining momentum in all sectors. This book offers a collection of protocol standards, issues, security improvements, applicability, features, and types of cryptocurrency in processing and through 5G technology. The book covers the evolution of blockchain from fundamental theories to present forms. It offers diversified business applications with usable case studies and provides successful implementations in cloud/edge computing, smart city, and IoT. The book emphasizes the advances and cutting-edge technologies along with the different tools and platforms. The primary audience for this book includes industry experts, researchers, graduates and under graduates, practitioners, and business managers who are engaged in blockchain and IoT-related technologies.

Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems

Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems
Author: V. Bindhu
Publisher: Springer Nature
Total Pages: 1048
Release: 2023-03-14
Genre: Technology & Engineering
ISBN: 9811977534

This book includes high-quality research papers presented at the Fourth International Conference on Communication, Computing and Electronics Systems (ICCCES 2022), held at the PPG Institute of Technology, Coimbatore, India, on September 15–16, 2022. The book focuses mainly on the research trends in cloud computing, mobile computing, artificial intelligence and advanced electronics systems. The topics covered are automation, VLSI, embedded systems, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, communication networks, Internet of things, cyber-physical systems and healthcare informatics.

Advances in Distributed Computing and Machine Learning

Advances in Distributed Computing and Machine Learning
Author: Suchismita Chinara
Publisher: Springer Nature
Total Pages: 600
Release: 2023-06-27
Genre: Technology & Engineering
ISBN: 9819912032

This book is a collection of peer-reviewed best selected research papers presented at the Fourth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2023), organized by Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India, during 15–16 January 2023. This book presents recent innovations in the field of scalable distributed systems in addition to cutting edge research in the field of Internet of Things (IoT) and blockchain in distributed environments.

Modeling and Design of Secure Internet of Things

Modeling and Design of Secure Internet of Things
Author: Charles A. Kamhoua
Publisher: John Wiley & Sons
Total Pages: 704
Release: 2020-06-05
Genre: Technology & Engineering
ISBN: 1119593379

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: Presents information on game-theory analysis of cyber deception Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation Contains contributions from an international panel of experts Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.