Advances in Computing, Informatics, Networking and Cybersecurity


Book Description

This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in today’s society. Four major driving pillars in the field are computing, which nowadays enables data processing in unprecedented speeds, informatics, which derives information stemming for processed data to feed relevant applications, networking, which interconnects the various computing infrastructures and cybersecurity for addressing the growing concern for secure and lawful use of the ICT infrastructure and services. Its intended readership covers senior undergraduate and graduate students in Computer Science and Engineering and Electrical Engineering, as well as researchers, scientists, engineers, ICT managers, working in the relevant fields and industries.




Advances in Cybersecurity Management


Book Description

This book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information security management, government security policy, web penetration testing, security operations, and vulnerabilities management. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity management specialists and educators for keeping current their cybersecurity management knowledge. Further, they provide a glimpse of future directions where cybersecurity management techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity management experts in the listed fields and edited by prominent cybersecurity management researchers and specialists.







Intelligent Computing on IoT 2.0, Big Data Analytics, and Block Chain Technology


Book Description

The book is designed as a reference text and explores the concepts and techniques of IoT, artificial intelligence (AI), and blockchain. It also discusses the possibility of applying blockchain for providing security in various domains. The specific highlight of this book is focused on the application of integrated technologies in enhancing data models, better insights and discovery, intelligent predictions, smarter finance, smart retail, global verification, transparent governance, and innovative audit systems. The book discusses the potential of blockchain to significantly increase data while boosting accuracy and integrity in IoT-generated data and AI-processed information. It elucidates definitions, concepts, theories, and assumptions involved in smart contracts and distributed ledgers related to IoT systems and AI approaches. The book offers real-world uses of blockchain technologies in different IoT systems and further studies its influence in supply chains and logistics, the automotive industry, smart homes, the pharmaceutical industry, agriculture, and other areas. It also presents readers with ways of employing blockchain in IoT and AI, helping them to understand what they can and cannot do with blockchain. The book is aimed primarily at advanced undergraduates and graduates studying computer science, computer engineering, electrical engineering, information systems, computational sciences, artificial intelligence, and information technology. Researchers and professionals will also find this book very useful.




Cybercrime and Information Technology


Book Description

Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices. Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation. Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things. Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.




Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things


Book Description

The fast-growing number of patients suffering from various ailments has overstretched the carrying capacity of traditional healthcare systems. This handbook addresses the increased need to tackle security issues and preserve patients’ privacy concerns in Artificial Intelligence of Medical Things (AIoMT) devices and systems. Handbook of Security and Privacy of AI-Enabled Healthcare Systems and the Internet of Medical Things provides new insights into the deployment, application, management, and benefits of AIoMT by examining real-world scenarios. The handbook takes a critical look at existing security designs and offers solutions to revamp traditional security architecture, including the new design of effi cient intrusion detection algorithms, attack prevention techniques, and both cryptographic and noncryptographic solutions. The handbook goes on to discuss the critical security and privacy issues that affect all parties in the healthcare ecosystem and provides practical AI-based solutions. This handbook offers new and valuable information that will be highly beneficial to educators, researchers, and others. .




Modelling and Simulation of Fast-Moving Ad-Hoc Networks (FANETs and VANETs)


Book Description

In the event of a disastrous event leading to the loss of communication networks, ad-hoc networks are a potent wireless communication resource because of their unique features including being quickly deployable and having a distributed nature, large coverage area, reduced cost, and more. Flying ad-hoc networks (FANETS) and vehicular ad-hoc networks (VANETS) are the future technology and can solve many problems in e-commerce delivery through drones, agriculture, vaccine delivery, and more. The unique characteristics of these networks and special requirements have created new challenges for the research community in recent decades. Modelling and Simulation of Fast-Moving Ad-Hoc Networks (FANETs and VANETs) enhances the modelling and simulation aspects of FANETS and VANETS and understands the protocols in mac layer and network layers for fast-moving ad-hoc networks. It presents simulations run using various simulation tools and measures the performance metrics of ad-hoc networks. Covering topics such as emulation tools, secure communication, and modelling software, this premier reference source is an excellent resource for computer scientists, IT specialists, business leaders and managers, supply chain and logistics management, libraries, students, government officials, international organizations, law enforcement, engineers, agriculturalists, researchers, and academicians.







Smart Mobile Communication & Artificial Intelligence


Book Description

Zusammenfassung: Interactive mobile technologies are today the core of many--if not all--fields of society. Not only the younger generation of students expects a mobile working and learning environment. And nearly daily new ideas, technologies, and solutions boost this trend. To discuss and assess the trends in the interactive mobile field are the aims connected with the 15th International Conference on Interactive Mobile Communication, Technologies, and Learning (IMCL2023), which was held 9-10 November 2023. Since its beginning in 2006, this conference is devoted to new approaches in interactive mobile technologies with a focus on learning. Nowadays, the IMCL conferences are a forum of the exchange of new research results and relevant trends as well as the exchange of experiences and examples of good practice. Interested readership includes policy makers, academics, educators, researchers in pedagogy and learning theory, schoolteachers, learning Industry, further education lecturers, etc




Cybersecurity and Secure Information Systems


Book Description

This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.