Enhancing Computer Security with Smart Technology


Book Description

Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems relat




Smart Cities Cybersecurity and Privacy


Book Description

Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city's physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications. - Consolidates in one place state-of-the-art academic and industry research - Provides a holistic and systematic framework for design, evaluating, and deploying the latest security solutions for smart cities - Improves understanding and collaboration among all smart city stakeholders to develop more secure smart city architectures




Enhancing Computer Security


Book Description




Smart and Agile Cybersecurity for IoT and IIoT Environments


Book Description

The world we live in today is highly interconnected and has seen a significant rise in the use of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). This digital transformation, while beneficial, has also created new cybersecurity challenges. Cyber threats are becoming more sophisticated and frequent, and individuals and organizations alike must adopt intelligent and agile cybersecurity solutions to safeguard their digital assets. Smart and Agile Cybersecurity for IoT and IIoT Environments addresses this pressing challenge by providing a comprehensive guide to securing IoT and IIoT environments. The book offers insights into the latest cybersecurity strategies and technologies, from intelligent threat detection to agile security approaches. By delving into data privacy, network security, and incident response, readers can gain the knowledge and skills to fortify their cybersecurity posture and mitigate risks effectively.




Data Science with Semantic Technologies


Book Description

As data is an important asset for any organization, it is essential to apply semantic technologies in data science to fulfill the need of any organization. This first volume of a two-volume handbook set provides a roadmap for new trends and future developments of data science with semantic technologies. Data Science with Semantic Technologies: New Trends and Future Developments highlights how data science enables the user to create intelligence through these technologies. In addition, this book offers the answers to various questions such as: Can semantic technologies facilitate data science? Which type of data science problems can be tackled by semantic technologies? How can data scientists benefit from these technologies? What is the role of semantic technologies in data science? What is the current progress and future of data science with semantic technologies? Which types of problems require the immediate attention of the researchers? What should be the vision 2030 for data science? This volume can serve as an important guide toward applications of data science with semantic technologies for the upcoming generation and, thus, it is a unique resource for scholars, researchers, professionals, and practitioners in this field.




Smart Technologies and Innovation for a Sustainable Future


Book Description

The book presents high-quality research papers presented at the 1st AUE International research conference, AUEIRC 2017, organized by the American University in the Emirates, held on November 15th-16th, 2017 in Dubai. The book is broadly divided into three sections: Media and Smart Cities, Creative Technologies and Innovation, and Security Risks and Strategic Challenges. The areas covered under these sections are cyber-psychology and digital forensics, cloud RAN architecture, networking functions virtualization, e-Governance and IoT semantic interoperability, ERP security, web-based application and problem-solving skills, smart technologies and advertising, smart technologies for smart cities, smart adaptable navigation systems, turbo codes for security key generation, technology advanced student learning and mobile devices, big data security and privacy, multi-channel buffer enabled technique, physiological signal acquisition in electro-oculography, blockchain and donation-based crowdfunding, smart city and framework development approach, news channel and media education, UAE foreign policy, China-GCC relations, diplomacy in the Internet age, intelligent cyber-security strategies, industry securities and strategic challenges, hybrid alliances and corporate security, security and privacy in smart cities, human computer interaction and e-learning solution, complexity of smart cities governance. The papers included in this book present insightful information on the most recent and relevant research, theories and practices in the field, which aim for a sustainable future.




Effective Model-Based Systems Engineering


Book Description

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.




Handbook of Research on Intrusion Detection Systems


Book Description

Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.




Future of Organizations and Work After the 4th Industrial Revolution


Book Description

This book takes a forward-looking approach by bringing in research and contributions that facilitate in mapping the impact of AI and big data on businesses, the nature of work along with providing practical solutions for preparing the work, workplace, and the workforce of the future. Organizations globally have been experiencing immense transformation due to the reinvention and redefining of the business models due to the dynamic nature of the business environment. Looking at an organizational context, undeniably, the definition of ‘work’ and ‘organizations’ is genuinely changing. Artificial intelligence, big data, automation, and robotics are a few of those keywords that are seemingly entering the workplace and reshaping the way work is being done. Moreover, the transition that is being addressed herein not only focuses upon aspects that are operative within an organization like the organizational culture, team building, networking, recruitments, and so on but also aims to address the external aspects like supply chain management, value chain analysis, investment management, etc. Broadly, every single step that is now taken is intensely experiencing this impact upon its functioning. This book serves as a guide not just to the academia but also to the industry to adopt suitable strategies that offer insights into global best practices as well as the innovations in the domain.




Innovations in Data Analytics


Book Description

This book features research papers presented at the 1st International Conference on Innovations in Data Analytics (ICIDA 2022), held at Eminent College of Management and Technology (ECMT), West Bengal, India, during November 29–30, 2022. The book presents original research work in the areas of computational intelligence, advance computing, network security and telecommunication, data science and data analytics, and pattern recognition. The book is beneficial for readers from both academia and industry.