Advances in cyber security and intelligent analytics. (2022)
- Record Type:
- Book
- Title:
- Advances in cyber security and intelligent analytics. (2022)
- Main Title:
- Advances in cyber security and intelligent analytics
- Further Information:
- Note: Edited by Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina E. Balas.
- Editors:
- Verma, Abhishek
- Contents:
- 1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA 2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN 3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework D. SANTHADEVI AND B. JANET 4 Exploring the possibility of blockchain and smart contract-based digital certificate P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN 5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH 6 Addressing the cybersecurity issues in cloud computing SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD 7 Role of medical image encryption algorithms in cloud platform for teleradiology applications SIJU JOHN AND S. N. KUMAR 8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things THULASI M. SANTHI AND M. C. HELEN MARY 9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA 10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID 11 A detailed cram on artificial intelligence industrial systems 4.0 P. DHARANYADEVI,1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA 2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN 3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework D. SANTHADEVI AND B. JANET 4 Exploring the possibility of blockchain and smart contract-based digital certificate P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN 5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH 6 Addressing the cybersecurity issues in cloud computing SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD 7 Role of medical image encryption algorithms in cloud platform for teleradiology applications SIJU JOHN AND S. N. KUMAR 8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things THULASI M. SANTHI AND M. C. HELEN MARY 9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA 10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID 11 A detailed cram on artificial intelligence industrial systems 4.0 P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI 12 Ensuring liveliness property in safety-critical systems ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR 13 Machine learning for intelligent analytics JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL 14 Secure 3D route optimization of combat vehicles in war field using IoV ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA 15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH 16 Containerization in cloud computing for OS-level virtualization MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK 17 An adaptive deep learning approach for stock price forecasting RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2022
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer networks -- Security measures
Internet -- Security measures
Electronic data processing -- Distributed processing
Computer security -- Technologial innovations - Languages:
- English
- ISBNs:
- 9781000821451
9781000821390 - Related ISBNs:
- 9781032216003
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.738168
- Ingest File:
- 15_016.xml