Author: Geetha, S.
Publisher: IGI Global
ISBN: 1522582428
Category : Computers
Languages : en
Pages : 364
Book Description
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
Author: Geetha, S.
Publisher: IGI Global
ISBN: 1522582428
Category : Computers
Languages : en
Pages : 364
Book Description
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
Publisher: IGI Global
ISBN: 1522582428
Category : Computers
Languages : en
Pages : 364
Book Description
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
Effective Model-Based Systems Engineering
Author: John M. Borky
Publisher: Springer
ISBN: 3319956698
Category : Technology & Engineering
Languages : en
Pages : 788
Book Description
This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.
Publisher: Springer
ISBN: 3319956698
Category : Technology & Engineering
Languages : en
Pages : 788
Book Description
This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.
Critical Concepts, Standards, and Techniques in Cyber Forensics
Author: Husain, Mohammad Shahid
Publisher: IGI Global
ISBN: 1799815609
Category : Computers
Languages : en
Pages : 292
Book Description
Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.
Publisher: IGI Global
ISBN: 1799815609
Category : Computers
Languages : en
Pages : 292
Book Description
Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.
International Conference on Innovative Computing and Communications
Author: Deepak Gupta
Publisher: Springer Nature
ISBN: 9811925356
Category : Technology & Engineering
Languages : en
Pages : 835
Book Description
This book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 19–20, 2022. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Publisher: Springer Nature
ISBN: 9811925356
Category : Technology & Engineering
Languages : en
Pages : 835
Book Description
This book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 19–20, 2022. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities
Author: Elshenraki, Hossam Nabil
Publisher: IGI Global
ISBN: 1799823628
Category : Social Science
Languages : en
Pages : 165
Book Description
The internet has greatly enhanced access to, dissemination, and sale of child pornography, which is a profitable industry estimated to generate billions of dollars worldwide. While efforts to address the issue of sexual exploitation of children may be slow, the capabilities of offenders to organize, communicate over the internet, and harness technology are unequivocally fast. Protection of children against cyber exploitation has become imperative, and measures should be taken that are specific and targeted to provide specialized victim identification capabilities; adequate protection for children using the internet; genuine participation of children; a full and responsible private sector; and finally, coordinated, effective, and structured international cooperation to protect all children. Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities provides innovative research for understanding all elements of combating cyber exploitation of children including the roles of law enforcement, international organizations, and the judicial system and educating children and their families to the dangers of the independent internet usage through cyberspace awareness programs. The content within this publication examines child grooming, cyberbullying, and cybercrime. It is designed for law enforcement, lawmakers, teachers, government officials, policymakers, IT specialists, cybercriminal researchers, psychologists, victim advocates, professionals, academicians, researchers, and students.
Publisher: IGI Global
ISBN: 1799823628
Category : Social Science
Languages : en
Pages : 165
Book Description
The internet has greatly enhanced access to, dissemination, and sale of child pornography, which is a profitable industry estimated to generate billions of dollars worldwide. While efforts to address the issue of sexual exploitation of children may be slow, the capabilities of offenders to organize, communicate over the internet, and harness technology are unequivocally fast. Protection of children against cyber exploitation has become imperative, and measures should be taken that are specific and targeted to provide specialized victim identification capabilities; adequate protection for children using the internet; genuine participation of children; a full and responsible private sector; and finally, coordinated, effective, and structured international cooperation to protect all children. Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities provides innovative research for understanding all elements of combating cyber exploitation of children including the roles of law enforcement, international organizations, and the judicial system and educating children and their families to the dangers of the independent internet usage through cyberspace awareness programs. The content within this publication examines child grooming, cyberbullying, and cybercrime. It is designed for law enforcement, lawmakers, teachers, government officials, policymakers, IT specialists, cybercriminal researchers, psychologists, victim advocates, professionals, academicians, researchers, and students.
Emerging Technologies in Data Mining and Information Security
Author: Paramartha Dutta
Publisher: Springer Nature
ISBN: 9811940525
Category : Technology & Engineering
Languages : en
Pages : 754
Book Description
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during 23–25 February 2022. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
Publisher: Springer Nature
ISBN: 9811940525
Category : Technology & Engineering
Languages : en
Pages : 754
Book Description
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during 23–25 February 2022. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
Handbook of Research on Artificial Intelligence and Soft Computing Techniques in Personalized Healthcare Services
Author: Uma N. Dulhare
Publisher: CRC Press
ISBN: 1000844277
Category : Technology & Engineering
Languages : en
Pages : 493
Book Description
This volume demonstrates the diverse state-of-the-art applications that combine artificial intelligence with soft computing, which has great potential for creating smart personalized healthcare services. The book showcases the myriad uses of AI and computer techniques in healthcare that employ deep learning, robotics, machine learning, blockchain, emerging cloud, edge computing, Practical Byzantine Fault Tolerance consensus, CNN architecture, Splunk, genetic algorithms (GA), DurBhashan, and many more. These technologies can be used in healthcare for enhanced data sharing, remote health monitoring, tele-rehabilitation, connecting rural populations with healthcare services, identifying diseases and health issues, automated medical diagnosis, analyzing information in surgical videos, ensuring timely communication and transportation during health disasters and emergencies, for optimizing expenditures, and more.
Publisher: CRC Press
ISBN: 1000844277
Category : Technology & Engineering
Languages : en
Pages : 493
Book Description
This volume demonstrates the diverse state-of-the-art applications that combine artificial intelligence with soft computing, which has great potential for creating smart personalized healthcare services. The book showcases the myriad uses of AI and computer techniques in healthcare that employ deep learning, robotics, machine learning, blockchain, emerging cloud, edge computing, Practical Byzantine Fault Tolerance consensus, CNN architecture, Splunk, genetic algorithms (GA), DurBhashan, and many more. These technologies can be used in healthcare for enhanced data sharing, remote health monitoring, tele-rehabilitation, connecting rural populations with healthcare services, identifying diseases and health issues, automated medical diagnosis, analyzing information in surgical videos, ensuring timely communication and transportation during health disasters and emergencies, for optimizing expenditures, and more.
Explainable Artificial Intelligence for Cyber Security
Author: Mohiuddin Ahmed
Publisher: Springer Nature
ISBN: 3030966305
Category : Computers
Languages : en
Pages : 283
Book Description
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.
Publisher: Springer Nature
ISBN: 3030966305
Category : Computers
Languages : en
Pages : 283
Book Description
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.
Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799853527
Category : Computers
Languages : en
Pages : 1924
Book Description
Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become increasingly popular as of late. The transparency and security provided by blockchain technology is challenging innovation in a variety of businesses and is being applied in fields that include accounting and finance, supply chain management, and education. With the ability to perform such tasks as tracking fraud and securing the distribution of medical records, this technology is key to the advancement of many industries. The Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government is a vital reference source that examines the latest scholarly material on trends, techniques, and uses of blockchain technology applications in a variety of industries, and how this technology can further transparency and security. Highlighting a range of topics such as cryptography, smart contracts, and decentralized blockchain, this multi-volume book is ideally designed for academics, researchers, industry leaders, managers, healthcare professionals, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.
Publisher: IGI Global
ISBN: 1799853527
Category : Computers
Languages : en
Pages : 1924
Book Description
Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become increasingly popular as of late. The transparency and security provided by blockchain technology is challenging innovation in a variety of businesses and is being applied in fields that include accounting and finance, supply chain management, and education. With the ability to perform such tasks as tracking fraud and securing the distribution of medical records, this technology is key to the advancement of many industries. The Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government is a vital reference source that examines the latest scholarly material on trends, techniques, and uses of blockchain technology applications in a variety of industries, and how this technology can further transparency and security. Highlighting a range of topics such as cryptography, smart contracts, and decentralized blockchain, this multi-volume book is ideally designed for academics, researchers, industry leaders, managers, healthcare professionals, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.
Research Anthology on Securing Medical Systems and Records
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668463121
Category : Computers
Languages : en
Pages : 1060
Book Description
With the influx of internet and mobile technology usage, many medical institutions—from doctor’s offices to hospitals—have implemented new online technologies for the storage and access of health data as well as the monitoring of patient health. Telehealth was particularly useful during the COVID-19 pandemic, which monumentally increased its everyday usage. However, this transition of health data has increased privacy risks, and cyber criminals and hackers may have increased access to patient personal data. Medical staff and administrations must remain up to date on the new technologies and methods in securing these medical systems and records. The Research Anthology on Securing Medical Systems and Records discusses the emerging challenges in healthcare privacy as well as the technologies, methodologies, and emerging research in securing medical systems and enhancing patient privacy. It provides information on the implementation of these technologies as well as new avenues of medical security research. Covering topics such as biomedical imaging, internet of things, and watermarking, this major reference work is a comprehensive resource for security analysts, data scientists, hospital administrators, leaders in healthcare, medical professionals, health information managers, medical professionals, mobile application developers, security professionals, technicians, students, libraries, researchers, and academicians.
Publisher: IGI Global
ISBN: 1668463121
Category : Computers
Languages : en
Pages : 1060
Book Description
With the influx of internet and mobile technology usage, many medical institutions—from doctor’s offices to hospitals—have implemented new online technologies for the storage and access of health data as well as the monitoring of patient health. Telehealth was particularly useful during the COVID-19 pandemic, which monumentally increased its everyday usage. However, this transition of health data has increased privacy risks, and cyber criminals and hackers may have increased access to patient personal data. Medical staff and administrations must remain up to date on the new technologies and methods in securing these medical systems and records. The Research Anthology on Securing Medical Systems and Records discusses the emerging challenges in healthcare privacy as well as the technologies, methodologies, and emerging research in securing medical systems and enhancing patient privacy. It provides information on the implementation of these technologies as well as new avenues of medical security research. Covering topics such as biomedical imaging, internet of things, and watermarking, this major reference work is a comprehensive resource for security analysts, data scientists, hospital administrators, leaders in healthcare, medical professionals, health information managers, medical professionals, mobile application developers, security professionals, technicians, students, libraries, researchers, and academicians.