20%
89.90
CHF71.90
Download est disponible immédiatement
This book highlights the literature and the practical aspects to understand cybersecurity and privacy in various networks and communication devices. It provides details of emerging technologies on various networks by protecting the privacy and security of cyberspace. This book presents state-of-the-art advances in the field of cryptography and network security, cybersecurity and privacy, providing a good reference for professionals and researchers.
Auteur
Dr. Omprakash Kaiwartya (Senior Member, IEEE) received his Ph.D. degree in computer science from Jawaharlal Nehru University, New Delhi, India, in 2015. He is currently working as a Senior Lecturer at Nottingham Trent University, U.K. His research interest focuses on drone-enabled networking, E-mobility-centric electric vehicles, IoT-enabled smart services, connected vehicles, and next generation wireless systems.
Mr. Keshav Kaushik is currently an Assistant Professor in the School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. He has over 7 years of teaching and research experience in Cybersecurity, Digital Forensics, the Internet of Things, and Blockchain Technology. Mr. Kaushik received his B.Tech degree in Computer Science and Engineering from the University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak. In addition, M.Tech degree in Information Technology from YMCA University of Science and Technology, Faridabad, Haryana. He has published over 20 research articles in International Journals and has presented at International Conferences. He is a Certified Ethical Hacker (CEH) v11, CQI and IRCA Certified ISO/IEC 27001:2013 Lead Auditor, and Quick Heal Academy certified Cyber Security Professional (QCSP). He has been a keynote speaker and delivered 50+ professional talks at various national and international platforms. He has edited more than 7 books. Dr. Sachin Kumar Gupta received his Ph.D. with Specialization in Systems Engineering from Indian Institute of Technology (Banaras Hindu University), Varanasi (UP), India, in 2016. Currently, he is working as Assistant Professor in the School of Electronics and Communication Engineering, Shri Mata Vaishno Devi University, Kakryal, Katra, (J&K), India. His research interest includes cryptography and network security, networking.
Dr. Ashutosh Mishra obtained his Ph.D. from the Department of Electronics Engineering, Indian Institute of Technology (Banaras Hindu University) Varanasi in 2018. Currently, he is working as Postdoctoral Research Fellow (KRF) at Yonsei University International Campus, South Korea. His research interests include artificial intelligence, self-driving car, smart sensors, intelligent systems, security issues, and current trends in emerging networking.
Dr. Manoj Kumar completed his Ph.D. from The Northcap University and M.Sc. (Information Security and Digital Forensics) from Technological University Dublin (Formerly ITB Blanchardstown) Ireland in 2013. He has over 11 years of research, teaching, and corporate experience. Dr. Kumar is currently working as an Associate Professor in the School of Computer Science, University of Petroleum and Energy Studies (UPES), Dehradun. His research interests are in the areas of Machine Learning, Digital Image Processing, Digital Forensics, WSN, and Information Security. He has published over 85 articles in international refereed journals and conferences.
Contenu
Part I
Chapter 1: Network Security: Introduction, Tools and Techniques
Chapter 2: Cellular and Wireless Network Security
Chapter 3: Internet of Things (IoT): Security Models for IoT Communications
Chapter 4: Handling Cloud Security and Blockchain: Approaches and Techniques Chapter 5: Security, trust, and privacy for autonomous smart spaces using Wireless Sensor Networks
Chapter 6: Security challenges in Cognitive Wireless Sensor Networks
Part II
Chapter 7: Block-chained IoT Security Models
Chapter 8: Enhanced Security through the Blockchain Technology
Chapter 9: Blockchain-enabled IoT Device and Data Security and Privacy
Chapter 10: Location-aware Data Acquisition and Analysis using Machine Learning in Presence of Blockchain Chapter 11: Privacy Requirements in Cybersecurity Applications of Blockchain
Part III Chapter 12: AI-enabled secure Blockchain Systems
Chapter 13: Malware concepts and cyber security management
Chapter 14: Vulnerabilities, threat models and risk management Chapter 15: Intrusion detection and mitigation techniques