Author: Raj Jain
Publisher: Springer Nature
ISBN: 9819950805
Category : Computers
Languages : en
Pages : 377
Book Description
This book comprises the select proceedings of the 2nd International Conference on Cybersecurity and Evolutionary Data Engineering (ICCEDE 2022). The contents highlight cybersecurity and digital forensics, evolutionary data engineering, and data management for secure contemporary applications. It includes papers on data models, semantics, query language; AI-driven industrial automation, ERP, CRM data security; authentication and access control; cyberspace structure and models; and drone large data filtration, cleansing, and security, among others. This book is of immense interest to researchers in academia and industry working in the fields of electronics and data engineering.
Cybersecurity and Evolutionary Data Engineering
Using Real-Time Data and AI for Thrust Manufacturing
Author: Satishkumar, D.
Publisher: IGI Global
ISBN:
Category : Computers
Languages : en
Pages : 368
Book Description
In the dynamic world of manufacturing, the industry has grappled with ongoing issues such as expensive machine maintenance, operational inefficiencies, and the production of defective products. The need for informed decision-making to maintain quality, meet deadlines, and prevent disruptions is more crucial than ever. Enter Using Real-Time Data and AI for Thrust Manufacturing, a groundbreaking book that addresses these challenges head-on. As Industry 4.0 transforms the manufacturing sector through the integration of the Internet of Things (IoT) and artificial intelligence (AI), this book serves as a beacon for academic scholars and industry professionals alike, offering profound insights into the world of AI-driven industry solutions. The objective of this book is clearto revolutionize the manufacturing sector by leveraging human expertise and AI-driven data technologies. By delving into the realms of Industry 4.0, IoT, and AI, the book systematically tackles issues such as costly downtime, inefficient processes, and the production of substandard products. With a focus on turning raw data into meaningful insights, the book explores AI applications like machine learning and deep learning, natural language processing, and machine vision. From predictive maintenance to improved demand forecasting, quality assurance, inspection, and warehouse automation, the book positions AI as the linchpin of "Industry 4.0," ensuring not only cost savings but also safety improvements and supply-chain efficiencies.
Publisher: IGI Global
ISBN:
Category : Computers
Languages : en
Pages : 368
Book Description
In the dynamic world of manufacturing, the industry has grappled with ongoing issues such as expensive machine maintenance, operational inefficiencies, and the production of defective products. The need for informed decision-making to maintain quality, meet deadlines, and prevent disruptions is more crucial than ever. Enter Using Real-Time Data and AI for Thrust Manufacturing, a groundbreaking book that addresses these challenges head-on. As Industry 4.0 transforms the manufacturing sector through the integration of the Internet of Things (IoT) and artificial intelligence (AI), this book serves as a beacon for academic scholars and industry professionals alike, offering profound insights into the world of AI-driven industry solutions. The objective of this book is clearto revolutionize the manufacturing sector by leveraging human expertise and AI-driven data technologies. By delving into the realms of Industry 4.0, IoT, and AI, the book systematically tackles issues such as costly downtime, inefficient processes, and the production of substandard products. With a focus on turning raw data into meaningful insights, the book explores AI applications like machine learning and deep learning, natural language processing, and machine vision. From predictive maintenance to improved demand forecasting, quality assurance, inspection, and warehouse automation, the book positions AI as the linchpin of "Industry 4.0," ensuring not only cost savings but also safety improvements and supply-chain efficiencies.
5G Enabled Technology for Smart City and Urbanization System
Author: Susheela Hooda
Publisher: CRC Press
ISBN: 1040183190
Category : Computers
Languages : en
Pages : 294
Book Description
This book examines the applications, trends and challenges of 5G Enabled technologies for Smart City and Urbanization systems. It addresses the challenges to bringing such capabilities of 5G-enabled technologies for smart cities and urbanisation into practice by presenting the theoretical as well as technical research outcomes with case studies. It covers key areas, including smart building, smart health care, smart mobility, smart living, smart surveillance, and IOT-based systems. It explains how these systems are connected using different technologies that support 5G access and control protocols. • Offers a comprehensive understanding of the emergence of 5G technology and its integration with IoT, Big Data, and Artificial Intelligence for smart city and urbanisation • Focuses on useful applications of Smart City and Urbanization, which can enhance different aspects of urban life • Explores the advantages of using massive IoT and predictive analytics approaches in smart cities • IoT, Bigdata, Deep learning and machine learning techniques are explained to fuel smart city and Urbanization system • Addresses both theoretical and technical research outcomes related to smart city and urbanisation with 5G technology. It serves as a valuable reference for graduate students, researchers, and m practitioners seeking to deepen their knowledge and engage with the latest advancements in the areas of Smart cities and Urbanization systems.
Publisher: CRC Press
ISBN: 1040183190
Category : Computers
Languages : en
Pages : 294
Book Description
This book examines the applications, trends and challenges of 5G Enabled technologies for Smart City and Urbanization systems. It addresses the challenges to bringing such capabilities of 5G-enabled technologies for smart cities and urbanisation into practice by presenting the theoretical as well as technical research outcomes with case studies. It covers key areas, including smart building, smart health care, smart mobility, smart living, smart surveillance, and IOT-based systems. It explains how these systems are connected using different technologies that support 5G access and control protocols. • Offers a comprehensive understanding of the emergence of 5G technology and its integration with IoT, Big Data, and Artificial Intelligence for smart city and urbanisation • Focuses on useful applications of Smart City and Urbanization, which can enhance different aspects of urban life • Explores the advantages of using massive IoT and predictive analytics approaches in smart cities • IoT, Bigdata, Deep learning and machine learning techniques are explained to fuel smart city and Urbanization system • Addresses both theoretical and technical research outcomes related to smart city and urbanisation with 5G technology. It serves as a valuable reference for graduate students, researchers, and m practitioners seeking to deepen their knowledge and engage with the latest advancements in the areas of Smart cities and Urbanization systems.
Next-Generation Enterprise Security and Governance
Author: Mohiuddin Ahmed
Publisher: CRC Press
ISBN: 1000569799
Category : Computers
Languages : en
Pages : 172
Book Description
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
Publisher: CRC Press
ISBN: 1000569799
Category : Computers
Languages : en
Pages : 172
Book Description
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
Data Mining and Machine Learning in Cybersecurity
Author: Sumeet Dua
Publisher: CRC Press
ISBN: 1439839433
Category : Computers
Languages : en
Pages : 256
Book Description
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible
Publisher: CRC Press
ISBN: 1439839433
Category : Computers
Languages : en
Pages : 256
Book Description
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible
Contemporary Challenges for Cyber Security and Data Privacy
Author: Mateus-Coelho, Nuno
Publisher: IGI Global
ISBN:
Category : Computers
Languages : en
Pages : 324
Book Description
In an era defined by the pervasive integration of digital systems across industries, the paramount concern is the safeguarding of sensitive information in the face of escalating cyber threats. Contemporary Challenges for Cyber Security and Data Privacy stands as an indispensable compendium of erudite research, meticulously curated to illuminate the multifaceted landscape of modern cybercrime and misconduct. As businesses and organizations pivot towards technological sophistication for enhanced efficiency, the specter of cybercrime looms larger than ever. In this scholarly research book, a consortium of distinguished experts and practitioners convene to dissect, analyze, and propose innovative countermeasures against the surging tide of digital malevolence. The book navigates the intricate domain of contemporary cyber challenges through a prism of empirical examples and intricate case studies, yielding unique and actionable strategies to fortify the digital realm. This book dives into a meticulously constructed tapestry of topics, covering the intricate nuances of phishing, the insidious proliferation of spyware, the legal crucible of cyber law and the ominous specter of cyber warfare. Experts in computer science and security, government entities, students studying business and organizational digitalization, corporations and small and medium enterprises will all find value in the pages of this book.
Publisher: IGI Global
ISBN:
Category : Computers
Languages : en
Pages : 324
Book Description
In an era defined by the pervasive integration of digital systems across industries, the paramount concern is the safeguarding of sensitive information in the face of escalating cyber threats. Contemporary Challenges for Cyber Security and Data Privacy stands as an indispensable compendium of erudite research, meticulously curated to illuminate the multifaceted landscape of modern cybercrime and misconduct. As businesses and organizations pivot towards technological sophistication for enhanced efficiency, the specter of cybercrime looms larger than ever. In this scholarly research book, a consortium of distinguished experts and practitioners convene to dissect, analyze, and propose innovative countermeasures against the surging tide of digital malevolence. The book navigates the intricate domain of contemporary cyber challenges through a prism of empirical examples and intricate case studies, yielding unique and actionable strategies to fortify the digital realm. This book dives into a meticulously constructed tapestry of topics, covering the intricate nuances of phishing, the insidious proliferation of spyware, the legal crucible of cyber law and the ominous specter of cyber warfare. Experts in computer science and security, government entities, students studying business and organizational digitalization, corporations and small and medium enterprises will all find value in the pages of this book.
Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science
Author: Panda, Mrutyunjaya
Publisher: IGI Global
ISBN: 1799866610
Category : Computers
Languages : en
Pages : 392
Book Description
In today’s digital world, the huge amount of data being generated is unstructured, messy, and chaotic in nature. Dealing with such data, and attempting to unfold the meaningful information, can be a challenging task. Feature engineering is a process to transform such data into a suitable form that better assists with interpretation and visualization. Through this method, the transformed data is more transparent to the machine learning models, which in turn causes better prediction and analysis of results. Data science is crucial for the data scientist to assess the trade-offs of their decisions regarding the effectiveness of the machine learning model implemented. Investigating the demand in this area today and in the future is a necessity. The Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science provides an in-depth analysis on both the theoretical and the latest empirical research findings on how features can be extracted and transformed from raw data. The chapters will introduce feature engineering and the recent concepts, methods, and applications with the use of various data types, as well as examine the latest machine learning applications on the data. While highlighting topics such as detection, tracking, selection techniques, and prediction models using data science, this book is ideally intended for research scholars, big data scientists, project developers, data analysts, and computer scientists along with practitioners, researchers, academicians, and students interested in feature engineering and its impact on data.
Publisher: IGI Global
ISBN: 1799866610
Category : Computers
Languages : en
Pages : 392
Book Description
In today’s digital world, the huge amount of data being generated is unstructured, messy, and chaotic in nature. Dealing with such data, and attempting to unfold the meaningful information, can be a challenging task. Feature engineering is a process to transform such data into a suitable form that better assists with interpretation and visualization. Through this method, the transformed data is more transparent to the machine learning models, which in turn causes better prediction and analysis of results. Data science is crucial for the data scientist to assess the trade-offs of their decisions regarding the effectiveness of the machine learning model implemented. Investigating the demand in this area today and in the future is a necessity. The Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science provides an in-depth analysis on both the theoretical and the latest empirical research findings on how features can be extracted and transformed from raw data. The chapters will introduce feature engineering and the recent concepts, methods, and applications with the use of various data types, as well as examine the latest machine learning applications on the data. While highlighting topics such as detection, tracking, selection techniques, and prediction models using data science, this book is ideally intended for research scholars, big data scientists, project developers, data analysts, and computer scientists along with practitioners, researchers, academicians, and students interested in feature engineering and its impact on data.
Machine Intelligence and Big Data Analytics for Cybersecurity Applications
Author: Yassine Maleh
Publisher: Springer Nature
ISBN: 303057024X
Category : Computers
Languages : en
Pages : 539
Book Description
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today’s IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications.
Publisher: Springer Nature
ISBN: 303057024X
Category : Computers
Languages : en
Pages : 539
Book Description
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today’s IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications.
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Author: O. Sami Saydjari
Publisher: McGraw Hill Professional
ISBN: 1260118185
Category : Computers
Languages : en
Pages : 589
Book Description
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including: •Defining the fundamental nature and full breadth of the cybersecurity problem•Adopting an essential perspective that considers attacks, failures, and attacker mindsets •Developing and implementing risk-mitigating, systems-based solutions•Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
Publisher: McGraw Hill Professional
ISBN: 1260118185
Category : Computers
Languages : en
Pages : 589
Book Description
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including: •Defining the fundamental nature and full breadth of the cybersecurity problem•Adopting an essential perspective that considers attacks, failures, and attacker mindsets •Developing and implementing risk-mitigating, systems-based solutions•Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
Security, Privacy, and Forensics Issues in Big Data
Author: Joshi, Ramesh C.
Publisher: IGI Global
ISBN: 1522597441
Category : Computers
Languages : en
Pages : 474
Book Description
With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.
Publisher: IGI Global
ISBN: 1522597441
Category : Computers
Languages : en
Pages : 474
Book Description
With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.