Details
Title | Countering cyber attacks and preserving the integrity and availability of critical systems |
---|---|
Other creators | Geetha S., ; Phamila Asnath Victy |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Computer networks — Security measures. ; Computer crimes — Prevention. ; Computer security. ; COMPUTERS / Security / General. ; COMPUTERS / Security / Networking. ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1083671417 |
Record create date | 1/31/2019 |
Allowed Actions
pdf/2013190.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/2013190.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--.
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Cover
- Title Page
- Copyright Page
- Book Series
- Editorial Advisory Board
- Table of Contents
- Detailed Table of Contents
- Foreword
- Preface
- Acknowledgment
- Section 1: National Security and Cyber Warfare
- Chapter 1: Digital Forensics and Cyber Law Enforcement
- Chapter 2: The Fundamentals of Digital Forensics and Cyber Law
- Chapter 3: An Indian and Global Perspective on Cybercrime
- Chapter 4: Smart Video Surveillance Systems and Identification of Human Behavior Analysis
- Section 2: Critical IoT Infrastructure Security
- Chapter 5: IoT Evolution and Security Challenges in Cyber Space
- Chapter 6: Network Intrusion Detection and Prevention Systems for Attacks in IoT Systems
- Chapter 7: Study on Query-Based Information Extraction in IoT-Integrated Wireless Sensor Networks
- Chapter 8: Lightweight Secure Architectural Framework for Internet of Things
- Section 3: Emerging Trends and Methods for Cyber Forensics
- Chapter 9: The Role of Artificial Intelligence in Cyber Security
- Chapter 10: Techniques for Analysis of Mobile Malware
- Chapter 11: Intelligent Malware Detection Using Deep Dilated Residual Networks for Cyber Security
- Chapter 12: Security Framework for Smart Visual Sensor Networks
- Section 4: Techniques for Countering Cyber Attacks
- Chapter 13: Blockchain Technology Is a Boost to Cyber Security
- Chapter 14: Secured Information Exchange Using Haptic Codes
- Chapter 15: Real-Time ECG-Based Biometric Authentication System
- Chapter 16: Digital Healthcare Security Issues
- Compilation of References
- About the Contributors
- Index