Handbook of big data privacy. (2020)
- Record Type:
- Book
- Title:
- Handbook of big data privacy. (2020)
- Main Title:
- Handbook of big data privacy
- Further Information:
- Note: Kim-Kwang Raymond Choo, Ali Dehghantanha, editors.
- Other Names:
- Choo, Kim-Kwang Raymond
Dehghantanha, Ali - Contents:
- Intro -- Contents -- Contributors -- 1 Big Data and Privacy: Challenges and Opportunities -- 1 Introduction -- 2 Book Outline -- References -- 2 AI and Security of Critical Infrastructure -- 1 Introduction: Towards Smart Urbanization -- 2 Applications of Smart Technologies -- 3 Cyber Physical Systems -- 3.1 CPS in Healthcare -- 3.2 CPS in Transportation -- 3.3 CPS in Manufacturing -- 3.4 CPS in Power Systems: The Smart Grid -- 4 Security Challenges in Cyber Physical Systems -- 4.1 Eavesdropping -- 4.2 Spoofing -- 4.3 Denial of Service (DoS) -- 4.4 Code Injection -- 4.5 Malware 4.6 Control Hijacking -- 5 Defense Mechanisms -- 6 Applications of AI in Cyber Security -- 6.1 Traditional ML Algorithms for Cyber Security -- 6.1.1 Support Vector Machines (SVM) -- 6.1.2 K Nearest Neighbor (KNN) -- 6.1.3 Artificial Neural Network (ANN) -- 6.2 Deep Learning Algorithms -- 6.2.1 Deep Belief Networks (DBN) -- 6.2.2 Recurrent Neural Networks (RNN) -- 6.2.3 Convolutional Neural Networks (CNN) -- 6.2.4 Automatic Encoders -- 7 Deep Learning: Adapting to the Real World -- 8 Challenges of AI in Cyber Security -- 9 Conclusion -- References 3 Industrial Big Data Analytics: Challenges and Opportunities -- 1 Introduction -- 2 Big Data Characteristics -- 3 Industrial Big Data Sources and Applications -- 3.1 Industrial Big Data Sources -- 3.1.1 Large-Scale Data Devices -- 3.1.2 Life-Cycle Production Data -- 3.1.3 Enterprise Operation Data -- 3.1.4 Manufacturing Value Chain -- 3.1.5 ExternalIntro -- Contents -- Contributors -- 1 Big Data and Privacy: Challenges and Opportunities -- 1 Introduction -- 2 Book Outline -- References -- 2 AI and Security of Critical Infrastructure -- 1 Introduction: Towards Smart Urbanization -- 2 Applications of Smart Technologies -- 3 Cyber Physical Systems -- 3.1 CPS in Healthcare -- 3.2 CPS in Transportation -- 3.3 CPS in Manufacturing -- 3.4 CPS in Power Systems: The Smart Grid -- 4 Security Challenges in Cyber Physical Systems -- 4.1 Eavesdropping -- 4.2 Spoofing -- 4.3 Denial of Service (DoS) -- 4.4 Code Injection -- 4.5 Malware 4.6 Control Hijacking -- 5 Defense Mechanisms -- 6 Applications of AI in Cyber Security -- 6.1 Traditional ML Algorithms for Cyber Security -- 6.1.1 Support Vector Machines (SVM) -- 6.1.2 K Nearest Neighbor (KNN) -- 6.1.3 Artificial Neural Network (ANN) -- 6.2 Deep Learning Algorithms -- 6.2.1 Deep Belief Networks (DBN) -- 6.2.2 Recurrent Neural Networks (RNN) -- 6.2.3 Convolutional Neural Networks (CNN) -- 6.2.4 Automatic Encoders -- 7 Deep Learning: Adapting to the Real World -- 8 Challenges of AI in Cyber Security -- 9 Conclusion -- References 3 Industrial Big Data Analytics: Challenges and Opportunities -- 1 Introduction -- 2 Big Data Characteristics -- 3 Industrial Big Data Sources and Applications -- 3.1 Industrial Big Data Sources -- 3.1.1 Large-Scale Data Devices -- 3.1.2 Life-Cycle Production Data -- 3.1.3 Enterprise Operation Data -- 3.1.4 Manufacturing Value Chain -- 3.1.5 External Collaboration Data -- 3.2 Industrial Big Data Applications -- 3.2.1 Smart Factory Visibility -- 3.2.2 Machine Fleet Management -- 3.2.3 Proactive Maintenance -- 3.2.4 Service Innovation and Just in Time Smart Supply Chain 4 Industrial Big Data Challenges and Issues -- 4.1 Lack of Largescale Spatiotemporal Database Representation -- 4.2 Lack of Effective and Efficient Online Machine Learning Algorithms -- 4.3 Lack of Whole Processes Lifecycle Data Management Systems -- 4.4 Lack of Data Visualization Systems -- 4.5 Lack in Data Confidentiality Mechanisms -- 5 Industrial Big Data Analytics: Solutions and Future Remarks -- 5.1 System Infrastructures -- 5.1.1 Data Capture -- 5.1.2 Data Storage -- 5.1.3 Data Process -- 5.2 Data Analytics Methods and Techniques -- 5.2.1 Descriptive Analytics -- 5.2.2 Predictive Analytics 5.2.3 Prescriptive Analytics -- 6 Conclusion -- References -- 4 A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Contribution -- 4 Proposed Key Agreement and Authentication Scheme -- 4.1 Registration Phase -- 4.2 Key Agreement and Authentication Phase -- 5 Security and Performance Analyze of the Proposed Scheme -- 5.1 Security Review of the Proposed Method Against All Types of Network Attacks -- 5.2 Result and Formal Analyze -- 5.3 Performance Analysis -- 6 Conclusion -- References … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (397 pages)
- Subjects:
- 005.8
Computer security -- Handbooks, manuals, etc
Big data -- Security measures -- Handbooks, manuals, etc
Computer security
Electronic books
Handbooks and manuals - Languages:
- English
- ISBNs:
- 9783030385576
3030385574 - Related ISBNs:
- 9783030385569
3030385566 - Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.497516
- Ingest File:
- 03_065.xml