Handbook of Big Data and IoT Security

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices....

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Dehghantanha, Ali (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Choo, Kim-Kwang Raymond (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • 1 Big Data and Internet of Things Security and Forensics: Challenges and Opportunities
  • 2 Privacy of Big Data - a Review
  • 3 A Bibliometric Analysis of Authentication and Access Control in IoT Devices
  • 4 Towards Indeterminacy - Tolerant Access Control in IoT
  • 5 Private Cloud Storage Forensics: Seafile as a Case Study
  • 6 Distributed Filesystem Forensics: Ceph as a Case Study
  • 7 Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study
  • 8 Big Data Forensics: Hadoop Distributed File Systems as a Case Study
  • 9 Internet of Things Camera Identi cation Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform
  • 10 Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats
  • 11 Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study
  • 12 A Cyber Kill Chain Based Analysis of Remote Access Trojans
  • 13 Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications
  • 14 Bibliometric Analysis on the Rise of Cloud Security
  • 15 A Bibliometric Analysis of Botnet Detection Techniques
  • 16 Security in Online Games: Current Implementations and Challenges. .