Handbook Of Computer Networks And Cyber Security

Computers have become an integrated part of the modern world and are being extensively used for storing and retrieving information. Business organizations are becoming more productive and efficient with the use of Internet-based applications. A significant rise in their use can be seen for personal purposes as they provide speedy and accurate solution for performing a variety of tasks.

However, the vast amount of data and information that is being stored and communicated among these computing devices is usually of confidential nature which requires high-end protection from the adversarial attacks. Cyberattacks have become a crucial concern for the economies across the globe. Hence, it has become inevitable to establish adequate security measures to safeguard the sensitive information and security critical systems and to identify and evaluate the underlying factors influencing their development.

This handbook contains chapters dealing with different aspects of computer networks and cybersecurity.

Contents

  • 1 Security Frameworks in Mobile Cloud Computing … 1

  • 2 An Investigation Study of Privacy Preserving in Cloud

  • Computing Environment … 43

  • 3 Towards New Quantitative Cybersecurity Risk Analysis

  • Models for Information Systems: A Cloud Computing

  • Case Study… 63

  • 4 A Novel AckIBE-Based Secure Cloud Data Management

  • Framework … 91

  • 5 A Practicable Machine Learning Solution for

  • Security-Cognizant Data Placement on Cloud Platforms… 111

  • 6 Threats Behind Default Configurations of Network Devices:

  • Wired Local Network Attacks and Their Countermeasures … 133

  • 7 Security and Privacy Issues in Wireless Sensor and Body Area

  • Networks… 173

  • 8 Preventing Security and Privacy Attacks in WBANs… 201

  • 9 Underwater Wireless Sensor Networks … 227

  • 10 Security Issues in Cognitive Radio Ad Hoc Networks… 247

  • 11 Security and Privacy in Social Networks: Data and Structural

  • Anonymity … 265

  • 12 SOI FinFET for Computer Networks and Cyber Security Systems … 295

  • 13 Software-Defined Networking: A Novel Approach to Networks … 313

  • 14 Software-Defined Network (SDN) Data Plane Security: Issues,

  • Solutions, and Future Directions… 341

  • 15 Survey on DDoS Attack Techniques and Solutions

  • in Software-Defined Network … 389

  • 16 Cooperative Mechanisms for Defending Distributed Denial

  • of Service (DDoS) Attacks … 421

  • 17 Epidemic Modelling for the Spread of Bots Through DDoS

  • Attack in E-Commerce Network… 445

  • 18 Physical Unclonable Function (PUF)-Based Security

  • in Internet of Things (IoT): Key Challenges and Solutions … 461

  • 19 Fog Computing: Applications and Secure Data Aggregation… 475

  • 20 A Comprehensive Review of Distributed Denial of Service

  • (DDoS) Attacks in Fog Computing Environment … 493

  • 21 Secure Machine Learning Scenario from Big Data in Cloud

  • Computing via Internet of Things Network … 525

  • 22 Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First

  • Century: A Comprehensive Study … 555

  • 23 A Systematic Review on Security and Privacy Issues in Mobile

  • Devices and Systems… 585

  • 24 Investigation of Security Issues in Distributed System Monitoring … 609

  • 25 An Analysis of Provable Security Frameworks for RFID Security … 635

  • 26 Computational Techniques for Real-Time Credit Card Fraud

  • Detection … 653

  • 27 Requirements, Protocols, and Security Challenges in Wireless

  • Sensor Networks: An Industrial Perspective … 683

  • 28 Privacy Preservation of Electronic Health Record: Current

  • Status and Future Direction … 715

  • 29 QKD Protocols Security Between Theory and Engineering

  • Implementation … 741

  • 30 Survey of Security and Privacy Issues on Biometric System … 763

  • 31 A Novel Session Key Generation and Secure Communication

  • Establishment Protocol Using Fingerprint Biometrics … 777

  • 32 Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces … 807

  • 33 Permutation–Substitution Based Image Encryption

  • Algorithms Using Pseudorandom Number Generators … 825

  • 34 Recent Trends in Text Steganography with Experimental Study … 849

  • 35 Machine Learning Based Intrusion Detection Techniques… 873

  • 36 Feature Selection Using a Machine Learning to Classify

  • a Malware … 889

  • 37 DeepDGA-MINet: Cost-Sensitive Deep Learning Based

  • Framework for Handling Multiclass Imbalanced DGA Detection … 905

  • 38 ABFT: Analytics to Uplift Big Social Events Using Forensic Tools … 929

  • 39 HackIt: A Real-Time Simulation Tool for Studying Real-World

  • Cyberattacks in the Laboratory … 949

Download Book

Happy learning!

8 Likes

Thanks TheStrength