Prix bas
CHF155.20
Pas encore paru. Cet article sera disponible le 07.07.2025
Auteur
Agbotiname Lucky Imoize is a Lecturer in the Department of Electrical and Electronics Engineering at the University of Lagos, Nigeria. His research interests include 6G wireless communication, wireless security systems, and artificial intelligence. He is a Fulbright research fellow, the vice chair of the IEEE Communication Society Nigeria chapter, a registered engineer with the Council for the Regulation of Engineering in Nigeria, and a senior member of IEEE.
Oleksandr Kuznetsov is a professor at the Department of Theoretical and Applied Sciences, eCampus University, Italy, and a professor in the Department of Security Information Systems and Technologies at V. N. Karazin Kharkiv National University, Ukraine. A recognized expert in computer science, his research encompasses information and cybersecurity, applied cryptography, information and coding theory, and the modeling of complex technical systems. He has co-authored several national cryptographic standards for Ukraine.
Oleksandr Lemeshko is a Professor and Head of the V.V. Popovskyy Department of Infocommunication Engineering at Kharkiv National University of Radio Electronics, Ukraine. His research interests include cyber-resilient networks, incident response, network security, fault-tolerant networks, and Software-Defined Networks. He was a local researcher on a project funded by the National Research Foundation of Ukraine. He participates in the German-Ukrainian project, "DigiJED-2/3: Digital Education with Joined Efforts." He is the Chief Editor of the electronic journal Problems of Telecommunications and a senior member of IEEE.
Oleksandra Yeremenko is a Professor in the V.V. Popovskyy Department of Infocommunication Engineering at Kharkiv National University of Radio Electronics, Ukraine. Her research interests include cyber-resilience, communication network resilience, Future Networks, and Software-Defined Networks. She was the Vice Chair of the IEEE Young Professionals Ukraine Section Affinity Group and the IEEE Women in Engineering Ukraine Section Affinity Group. She is also a senior IEEE member and the Kharkiv Information & Communication Technologies ACM-W Chapter Chair.
Texte du rabat
This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, information security technologies, and beyond.
Contenu
Chapter 1- A Novel Hybrid Method for Randomness Extraction
Chapter 2- Blockchain technology as the new defense of information systems and networks in cyber-spheres
Chapter 3- Innovative Cost Functions for Optimizing Cryptographic S-Box Generation
Chapter 4- Enhanced Cryptographic Security through Advanced S-box Optimization: A Hybrid Heuristic Approach
Chapter 5- Enhancing Cryptographic Strength: A Novel Approach to S-Box Generation Using Modified Simulated Annealing
Chapter 6- Factorial Representation of S-boxes: A Novel Approach to Cryptographic Analysis and Optimization
Chapter 7- Optimized Simulated Annealing for Efficient Generation of Highly Nonlinear S-Boxes
Chapter 8- Analysis of Security Mechanisms of New Generation Cellular Networks
Chapter 9- Deep Learning Frontiers in Copy-Move Forgery Detection: Advances, Challenges, and Future Directions
Chapter 10- Deep Learning Model for Detecting Copy-Move Attack in Images: Testing and Verification
Chapter 11- System of Routing Solutions Based on Security-Aware Traffic Engineering Models
Chapter 12- Information Technology Security Platform for Intellectualization
Chapter 13- Robust Model and Training Method For Malware Recognition In IoT Devices
Chapter 14- Detection of network attacks based on the Red Hunt virtual machine
Chapter 15- Secure 5G Network for Monitoring State of Critical Infrastructure Facilities
Chapter 16- Cybersecurity and Resilience in the Data Centers Design in War Time
Chapter 17- Indexing the State of Military Cyber Defence and Hacktivism in Wartime in Ukraine
Chapter 18- Fast Quantification Methods for Reconfigurable Cybersecurity Systems Using Multi-Pattern Matching
Chapter 19- Research and Development of Normalized Link Blocking Models in Secure Traffic Engineering Routing for Programmable Networks
Chapter 20- AI-Driven Content Optimization and Generation with Integrated Digital Forensics for Authentic and Secure Media
Chapter 21- Visible Light Communication Enabling Next-Generation Wireless Networks
Chapter 22- Leveraging the Integrated Decision Model for the Emerging Market of Visible Light Communication
Chapter 23- Advancing Cyber Defense with Artificial Intelligence: State-of-the-Art Techniques and Future Directions