Cybersecurity and Secure Information Systems Challenges and Solutions in Smart Environments /

This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects o...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hassanien, Aboul Ella (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Elhoseny, Mohamed (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Advanced Sciences and Technologies for Security Applications,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04855nam a2200541 4500
001 978-3-030-16837-7
003 DE-He213
005 20191023112607.0
007 cr nn 008mamaa
008 190619s2019 gw | s |||| 0|eng d
020 |a 9783030168377  |9 978-3-030-16837-7 
024 7 |a 10.1007/978-3-030-16837-7  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Cybersecurity and Secure Information Systems  |h [electronic resource] :  |b Challenges and Solutions in Smart Environments /  |c edited by Aboul Ella Hassanien, Mohamed Elhoseny. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a X, 314 p. 128 illus., 95 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
505 0 |a Security and Privacy in Smart City Applications and Services: Opportunities and Challenges -- A Lightweight Multi-Level Encryption Model for IoT Applications -- An Efficient Image Encryption Scheme based on Signcryption Technique with Adaptive Elephant Herding Optimization -- Time Split based Pre-processing with a Data-driven Approach for Malicious URL Detection; Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model -- Deep learning Framework for Cyber Threat Situational Awareness based on Email and URL Data Analysis -- Application of Deep Learning Architectures for Cyber security.-Improved DGA Domain Names Detection and Categorization using Deep learning Architectures with Classical Machine learning Algorithms -- Secure Data Transmission through Reliable Vehicles in VANET using Optimal Lightweight Cryptography -- Some specific examples of attacks on information systems and smart cities applications -- Clustering Based Cybersecurity Model for Cloud Data -- A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques for Malware Family Identification -- Design and Implementation of a Research and Education Cybersecurity Operations Center. 
520 |a This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices. 
650 0 |a Computer security. 
650 0 |a System safety. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Privacy.  |0 http://scigraph.springernature.com/things/product-market-codes/I28010 
650 2 4 |a Security Science and Technology.  |0 http://scigraph.springernature.com/things/product-market-codes/P31080 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
700 1 |a Hassanien, Aboul Ella.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Elhoseny, Mohamed.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030168360 
776 0 8 |i Printed edition:  |z 9783030168384 
776 0 8 |i Printed edition:  |z 9783030168391 
830 0 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
856 4 0 |u https://doi.org/10.1007/978-3-030-16837-7  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)