International Journal Of Secure Software Engineering Vol 2 No 3
Download International Journal Of Secure Software Engineering Vol 2 No 3 full books in PDF, epub, and Kindle. Read online free International Journal Of Secure Software Engineering Vol 2 No 3 ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads.
Author |
: Javaid Iqbal |
Publisher |
: CRC Press |
Total Pages |
: 273 |
Release |
: 2023-12-07 |
ISBN-10 |
: 9781003808107 |
ISBN-13 |
: 1003808107 |
Rating |
: 4/5 (07 Downloads) |
Synopsis System Reliability and Security by : Javaid Iqbal
Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commissioned for use, how high the level of reliability is in the system, and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems. System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modeling and analysis of dependable and secure systems. It examines systems and applications having complex distributed or networked architectures in such fields as: Nuclear energy Ground transportation systems Air traffic control Healthcare and medicine Communications System reliability engineering is a multidisciplinary field that uses computational methods for estimating or predicting the reliability aspects of a system and analyzing failure data obtained from real-world projects. System security is a related field that ensures that even a reliable system is secure against accidental or deliberate intrusions and is free of vulnerabilities. This book covers tools and techniques, cutting-edge research topics, and methodologies in the areas of system reliability and security. It examines prediction models and methods as well as how to secure a system as it is being developed.
Author |
: Uzzal Sharma |
Publisher |
: CRC Press |
Total Pages |
: 157 |
Release |
: 2022-08-24 |
ISBN-10 |
: 9781000618334 |
ISBN-13 |
: 1000618331 |
Rating |
: 4/5 (34 Downloads) |
Synopsis Advancing Computational Intelligence Techniques for Security Systems Design by : Uzzal Sharma
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable. Key features: Focuses on the computational intelligence techniques of security system design Covers applications and algorithms of discussed computational intelligence techniques Includes convergence-based and enterprise integrated security systems with their applications Explains emerging laws, policies, and tools affecting the landscape of cyber security Discusses application of sensors toward the design of security systems This book will be useful for graduate students and researchers in electrical, computer engineering, security system design and engineering.
Author |
: Dr. Shahana A. M., Dr. A. Sivakumar & Mr. V. Parthiban |
Publisher |
: Lulu Publication |
Total Pages |
: 292 |
Release |
: 2021-06-25 |
ISBN-10 |
: 9781300395829 |
ISBN-13 |
: 1300395826 |
Rating |
: 4/5 (29 Downloads) |
Synopsis THE OPPORTUNITIES OF UNCERTAINTIES: FLEXIBILITY AND ADAPTATION NEEDED IN CURRENT CLIMATE Volume II (ICT and Engineering) by : Dr. Shahana A. M., Dr. A. Sivakumar & Mr. V. Parthiban
IOTA is a novel cryptocurrency that uses distributed ledger technology based on directed acyclic graph data structure. Security of cryptocurrencies ought to be scrutinized in order to acquire esteemed security, attain trust, and accomplish indelible adoption. Although IOTA prefers resilient security controls, IOTA security is not yet well explored. Among all the propounded IOTA vulnerabilities that have been identified, we pragmatically exploit replay attack against IOTA. It further analyze the attack to perceive its impact. Attack methodology and proof of concept for the replay attack is presented. Our proposed exploitation methodology is based upon address reuse, while IOTA in default mode does not reuse addresses. Distrust and privation of balance can be some of the severe impacts of this vulnerability. This system introduces the Crypto Terminal, a new open device for securing blockchain wallets.
Author |
: Azees Maria |
Publisher |
: Anchor Academic Publishing |
Total Pages |
: 141 |
Release |
: 2017-08-29 |
ISBN-10 |
: 9783960676805 |
ISBN-13 |
: 3960676808 |
Rating |
: 4/5 (05 Downloads) |
Synopsis Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks by : Azees Maria
The Vehicular ad-hoc network (VANET) is an important communication paradigm in modern-day transport systems for exchanging live messages regarding traffic congestion, weather conditions, road conditions, and targeted location-based advertisements to improve the driving comfort. In such environments, authentication and privacy are two important challenges that need to be addressed. There are many existing works to provide authentication and privacy in VANETs. However, most of the existing authentication schemes are suffering from high computational cost during authentication and high communication cost during secure key distribution to a group of vehicles. Moreover, in many existing schemes, there is no conditional tracking mechanism available to revoke the misbehaving vehicles from the VANET system. In order to overcome these issues, four new approaches have been developed in this research work: Firstly, a dual authentication scheme is developed to provide a high level of security on the vehicle side to effectively prevent the unauthorized vehicles entering into the VANET. Moreover, a dual group key management scheme is developed to efficiently distribute a group key to a group of users and to update such group keys during the users’ join and leave operations. Secondly, in order to preserve the privacy of vehicle users, a computationally efficient privacy preserving anonymous authentication scheme (CPAV) is developed to anonymously authenticate the vehicle users based on the use of anonymous certificates and signatures. Moreover, a conditional tracking mechanism is introduced to trace the real identity of vehicles and revoke them from VANET in the case of dispute. Thirdly, an efficient anonymous authentication scheme to preserve the privacy of RSUs is proposed in this research work: Each authenticated vehicle is required to authenticate the RSUs in an anonymous manner before communicating with it because each RSU provides the location based safety information (LBSI) to all authenticated vehicles when they are entering its region. By doing this, each RSU provides the knowledge to vehicle users about the obstacles within its coverage area. Finally, a computationally efficient group key distribution (CEKD) scheme for secure group communication is proposed in this research work based on bilinear pairing.
Author |
: B.M.K. Prasad |
Publisher |
: CRC Press |
Total Pages |
: 1551 |
Release |
: 2017-02-15 |
ISBN-10 |
: 9781315318912 |
ISBN-13 |
: 1315318911 |
Rating |
: 4/5 (12 Downloads) |
Synopsis Communication and Computing Systems by : B.M.K. Prasad
This book is a collection of accepted papers that were presented at the International Conference on Communication and Computing Systems (ICCCS-2016), Dronacharya College of Engineering, Gurgaon, September 9–11, 2016. The purpose of the conference was to provide a platform for interaction between scientists from industry, academia and other areas of society to discuss the current advancements in the field of communication and computing systems. The papers submitted to the proceedings were peer-reviewed by 2-3 expert referees. This volume contains 5 main subject areas: 1. Signal and Image Processing, 2. Communication & Computer Networks, 3. Soft Computing, Intelligent System, Machine Vision and Artificial Neural Network, 4. VLSI & Embedded System, 5. Software Engineering and Emerging Technologies.
Author |
: Florentin Smarandache, Mumtaz Ali |
Publisher |
: Infinite Study |
Total Pages |
: 70 |
Release |
: 2015-04-01 |
ISBN-10 |
: 9781599733388 |
ISBN-13 |
: 1599733382 |
Rating |
: 4/5 (88 Downloads) |
Synopsis Neutrosophic Sets and Systems, Vol. VIII by : Florentin Smarandache, Mumtaz Ali
This volume is a collection of ten papers by contributors F. Smarandache, F. Yuhua, K. Mondal, S. Pramanik, S. Broumi, J. Ye, A. A. Salama,, N. Easa, S. A. Elhafez, M. M. Lotfy, L. Kong, Y. Wu, P. Biswas, B. C. Giri, A. Mukkerjee, and S. Sarkar, focusing on a new kind of algebraic structures called (T, I, F)- Neutrosophic Structures; Expanding Uncertainty Principle to Certainty-Uncertainty Principles with Neutrosophy and Quad-stage Methods; Rough Neutrosophic Multi-Attribute Decision-Making Based on Rough Accuracy Score Function; an Extended TOPSIS Method for Multiple Attribute Decision Making based on Interval Neutrosophic Uncertain Linguistic Variable; Review of Recommender Systems Algorithms Utilized in Social Networks based e-Learning Systems & Neutrosophic System; Fault Diagnosis Method of Gasoline Engines Using the Cosine Similarity Measure of Neutrosophic Numbers; Cosine Similarity Measure Based Multi-attribute Decision-making with Trapezoidal Fuzzy Neutrosophic Numbers; Thesis-Antithesis-Neutrothesis, and Neutrosynthesis; Negating Four Color Theorem with Neutrosophy and Quadstage Method; and A new method of measuring similarity between two neutrosophic soft sets and its application in pattern recognition problems.
Author |
: A. Vaseashta |
Publisher |
: IOS Press |
Total Pages |
: 176 |
Release |
: 2014-09-19 |
ISBN-10 |
: 9781614994466 |
ISBN-13 |
: 1614994463 |
Rating |
: 4/5 (66 Downloads) |
Synopsis Cyber Security and Resiliency Policy Framework by : A. Vaseashta
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most countries. Securing cyberspace to ensure the continuation of growing economies and to protect a nation’s way of life is a major concern for governments around the globe. This book contains papers presented at the NATO Advanced Research Workshop (ARW) entitled Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, held in Ohrid, the Former Yugoslav Republic of Macedonia (FYROM), in June 2013. The workshop aimed to develop a governing policy framework for nation states to enhance the cyber security of critical infrastructure. The 12 papers included herein cover a wide range of topics from web security and end-user training, to effective implementation of national cyber security policies and defensive countermeasures. The book will be of interest to cyber security professionals, practitioners, policy-makers, and to all those for whom cyber security is a critical and an important aspect of their work.
Author |
: Vikash Yadav |
Publisher |
: Bentham Science Publishers |
Total Pages |
: 232 |
Release |
: 2022-10-04 |
ISBN-10 |
: 9781681089683 |
ISBN-13 |
: 1681089688 |
Rating |
: 4/5 (83 Downloads) |
Synopsis Recent Developments in Artificial Intelligence and Communication Technologies by : Vikash Yadav
This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering. The collection of chapters should inspire scholars involved in theoretical and applied sciences to contribute to research using computational intelligence principles and methods in their respective research communities. Professionals working on systems engineering, communications, innovative computing systems and adaptive technologies for sustainable growth, will also be able to benefit from the information provided in the book.
Author |
: Nicholas Kolokotronis |
Publisher |
: CRC Press |
Total Pages |
: 395 |
Release |
: 2021-04-20 |
ISBN-10 |
: 9781000366617 |
ISBN-13 |
: 1000366618 |
Rating |
: 4/5 (17 Downloads) |
Synopsis Cyber-Security Threats, Actors, and Dynamic Mitigation by : Nicholas Kolokotronis
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.
Author |
: Chhabi Rani Panigrahi |
Publisher |
: CRC Press |
Total Pages |
: 200 |
Release |
: 2024-07-31 |
ISBN-10 |
: 9781040048368 |
ISBN-13 |
: 1040048366 |
Rating |
: 4/5 (68 Downloads) |
Synopsis Big Data and Edge Intelligence for Enhanced Cyber Defense by : Chhabi Rani Panigrahi
An unfortunate outcome of the growth of the Internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of edge artificial intelligence (EdgeAI) intended to help cyber security experts design robust cyber defense systems (CDS), including host-based and network-based intrusion detection system and digital forensic intelligence. This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cyber security big data, in addition to other basic information related to network security. In addition, it provides a brief overview of modern cyber security threats and outlines the advantages of using EdgeAI to counter these threats, as well as exploring various cyber defense mechanisms (CDM) based on detection type and approaches. Specific challenging areas pertaining to cyber defense through EdgeAI, such as improving digital forensic intelligence, proactive and adaptive defense of network infrastructure, and bio-inspired CDM, are also discussed. This book is intended as a reference for academics and students in the field of network and cybersecurity, particularly on the topics of intrusion detection systems, smart grid, EdgeAI, and bio-inspired cyber defense principles. The front-line EdgeAI techniques discussed will also be of use to cybersecurity engineers in their work enhancing cyber defense systems.