Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice

Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice
Author :
Publisher :
Total Pages : 134
Release :
ISBN-10 : 8793237219
ISBN-13 : 9788793237216
Rating : 4/5 (19 Downloads)

Synopsis Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice by : Jiang Bian

We are now in the era of the Big Data revolution where nearly every aspect of computing engineering is driven by increasingly large, complex, and diverse datasets. Big Data presents not only a world of new opportunities but also new challenges. With threats multiplying exponentially, the ability to gather and analyze massive information will be a decisive factor in the battle against malicious software and adversaries. It is natural to consider a cloud-computing environment to address the computational requirements for big data analytic applications. However, it is equally important to address the security concerns in terms of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In this special issue of JCSM on Big Data, the article by Miller et al. focuses on technical and policy infrastructure for digital forensic analysis in the cloud as cyber-crime is a growing trend around the world. Further, the massive collections of imagery on the Internet have inspired a stream of interesting work on image processing related big data topics. The article by Shen et al. describes their novel structure-based image completion algorithm for object removal while maintaining visually plausible content with consistent structure and scene texture in photos. Such novel technique can benefit a diverse range of applications, from image restoration, to privacy protection, to photo localization. A surge of graph-computing frameworks has appeared in both academia and industry to address the needs of processing complex and large graph-structured datasets, where each has its respective benefits and drawbacks. Leveraging the right platform for the right task is daunting for users of these frameworks. A review by Zhao et al. provides the context for selecting the right graph-parallel processing framework given the tasks in hand. They have studied several popular distributed graph-computing systems aiming to reveal the characteristics of those systems in performing common graph algorithms with real-world datasets. Their findings are extremely informative.

Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security

Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security
Author :
Publisher :
Total Pages : 148
Release :
ISBN-10 : 8793237057
ISBN-13 : 9788793237056
Rating : 4/5 (57 Downloads)

Synopsis Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security by : Roger Piqueras Jover

The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice and short messaging traffic for billions of users. This new cellular communication system is the natural evolution of 3rd Generation Partnership Project (3GPP)-based access networks, enhancing the Universal Mobile Telecommunications System (UMTS). LTE introduces a substantial redesign of the network architecture resulting in the new eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and the EPC (Enhanced Packet Core). In this context, the LTE Radio Access Network (RAN) is built upon a redesigned physical layer and based on an Orthogonal Frequency Division Multiple Access (OFDMA) modulation, which features robust performance in challenging multipath environments and substantially improves spectrum efficiency and capacity. Moreover, the new all-IP core architecture is designed to be more flexible and flatter, with a logical separation of the traffic related functions and the control and signaling functions. Over the last few years, researchers have published and presented potential vulnerabilities and attacks against the second generation of mobile networks, the Global System for Mobile Communications (GSM). Although technology, encryption schemes and security in general have drastically improved in LTE with respect of legacy GSM networks, security research should continue proactively working towards secure and resilient mobile communication systems. In this context, the cyber-security landscape has changed drastically over the last few years. It is now characterized by large scale security threats and the advent of sophisticated intrusions. These new threats illustrate the importance of strengthening the resiliency of mobility networks against security attacks, ensuring this way full mobility network availability. This special issue of the Journal of Cyber Security and Mobility addresses research advances in mobility security for LTE next generation mobility networks and other wireless communication systems. Two of the papers in this special issue analyze the threat of radio jamming. Lichtman et al. introduce a sophisticated reinforcement learning anti-jamming technique aimed at protecting frequency hopping wireless systems from jamming attacks while maximizing link throughput. Similarly, Kornemann et al. introduce a jamming detection mechanism for Wireless Sensor Networks (WSN), which are known to be substantially vulnerable to this type of attack. Focusing specifically on LTE mobile networks, Jermyn et al. perform a thorough simulation analysis of potential Denial of Service attacks against the eUTRAN by means of a botnet of malware-infected mobile terminals saturating the radio interface with large amounts of traffic. This type of malware infections and the connections of such a botnet to the malicious command and control servers could be detected with the system introduced by Bickford et al. This advanced detection scheme is capable to detect malicious activity in mobile terminals and proceed to mitigate and block the malicious applications. Finally, Alzahrani et al. present a very detailed and thorough analysis of the security research published over the last few years on mobile malware analysis, detection and mitigation. The valuable insights in this paper set a common ground and framework to facilitate research in this area, as well as to share results and easily replicate experiments.

Human Dynamics Research in Smart and Connected Communities

Human Dynamics Research in Smart and Connected Communities
Author :
Publisher : Springer
Total Pages : 250
Release :
ISBN-10 : 9783319732473
ISBN-13 : 3319732471
Rating : 4/5 (73 Downloads)

Synopsis Human Dynamics Research in Smart and Connected Communities by : Shih-Lung Shaw

This book addresses how accelerating advances in information and communication technology, mobile technology, and location-aware technology have fundamentally changed the ways how social, political, economic and transportation systems work in today’s globally connected world. It delivers on many exciting research questions related to human dynamics at both disaggregate and aggregate levels that attract the attention of researchers from a wide range of disciplines. Human Dynamics Research involves theoretical perspectives, space-time analytics, modeling human dynamics, urban analytics, social media and big data, travel dynamics, privacy issues, development of smart cities, and problems and prospects of human dynamics research. This book includes contributions on theoretical, technical, or application aspects of human dynamics research from different disciplines. Appealing to researchers, scholars and students across a wide range of topics and disciplines including: urban studies, space-time, mobility and the internet, social media, big data, behavioral geography and spatio-temporal-network visualization, this book offers a glimpse at the cutting edge of research on human dynamics.

The Routledge Handbook of Mobilities

The Routledge Handbook of Mobilities
Author :
Publisher : Routledge
Total Pages : 622
Release :
ISBN-10 : 9781317934134
ISBN-13 : 131793413X
Rating : 4/5 (34 Downloads)

Synopsis The Routledge Handbook of Mobilities by : Peter Adey

The 21st century seems to be on the move, perhaps even more so than the last. With cheap travel, and more than two billion cars projected worldwide for 2030. And yet, all this mobility is happening incredibly unevenly, at different paces and intensities, with varying impacts and consequences to the extent that life on the move might be actually quite difficult to sustain environmentally, socially and ethically. As a result 'mobility' has become a keyword of the social sciences; delineating a new domain of concepts, approaches, methodologies and techniques which seek to understand the character and quality of these trends. This Handbook explores and critically evaluates the debates, approaches, controversies and methodologies, inherent to this rapidly expanding discipline. It brings together leading specialists from range of backgrounds and geographical regions to provide an authoritative and comprehensive overview of this field, conveying cutting edge research in an accessible way whilst giving detailed grounding in the evolution of past debates on mobilities. It illustrates disciplinary trends and pathways, from migration studies and transport history to communications research, featuring methodological innovations and developments and conceptual histories - from feminist theory to tourist studies. It explores the dominant figures of mobility, from children to soldiers and the mobility impaired; the disparate materialities of mobility such as flows of water and waste to the vectors of viruses; key infrastructures such as logistics systems to the informal services of megacity slums, and the important mobility events around which our world turns; from going on vacation to the commute, to the catastrophic disruption of mobility systems. The text is forward-thinking, projecting the future of mobilities as they might be lived, transformed and studied, and possibly, brought to an end. International in focus, the book transcends disciplinary and national boundaries to explore mobilities as they are understood from different perspectives, different fields, countries and standpoints. This is an invaluable resource for all those with an interest in mobility across disciplinary boundaries and areas of study.

Journal of Cyber Security and Mobility 3-4

Journal of Cyber Security and Mobility 3-4
Author :
Publisher :
Total Pages : 82
Release :
ISBN-10 : 8793237650
ISBN-13 : 9788793237650
Rating : 4/5 (50 Downloads)

Synopsis Journal of Cyber Security and Mobility 3-4 by : Ashutosh Dutta

Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT) and machine-to-machine technologies.

Trust, Security and Privacy for Big Data

Trust, Security and Privacy for Big Data
Author :
Publisher : CRC Press
Total Pages : 212
Release :
ISBN-10 : 9781000619058
ISBN-13 : 1000619052
Rating : 4/5 (58 Downloads)

Synopsis Trust, Security and Privacy for Big Data by : Mamoun Alazab

Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT, social platforms, healthcare, system logs, bio-informatics, etc. contribute to and define the ethos of Big Data which is volume, velocity and variety. Data lakes formed by the amalgamation of data from these sources requires powerful, scalable and resilient storage and processing platforms to reveal the true value hidden inside this data mine. Data formats and its collection from various sources not only introduce unprecedented challenges to different domains including IoT, manufacturing, smart cars, power grids etc., but also highlight the security and privacy issues in this age of big data. Security and privacy in big data is facing many challenges, such as generative adversary networks, efficient encryption and decryption algorithms, encrypted information retrieval, attribute-based encryption, attacks on availability, and reliability. Providing security and privacy for big data storage, transmission, and processing have been attracting much attention in all big data related areas. The book provides timely and comprehensive information for researchers and industry partners in communications and networking domains to review the latest results in security and privacy related work of Big Data. It will serve computer science and cybersecurity communities including researchers, academicians, students, and practitioners who have interest in big data trust privacy and security aspects. It is a comprehensive work on the most recent developments in security of datasets from varied sources including IoT, cyber physical domains, big data architectures, studies for trustworthy computing, and approaches for distributed systems and big data security solutions etc.

Cybersecurity and Privacy in Cyber Physical Systems

Cybersecurity and Privacy in Cyber Physical Systems
Author :
Publisher : CRC Press
Total Pages : 434
Release :
ISBN-10 : 0429263899
ISBN-13 : 9780429263897
Rating : 4/5 (99 Downloads)

Synopsis Cybersecurity and Privacy in Cyber Physical Systems by : Yassine Maleh

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader's awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design. P> Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.

Journal of Cyber Security and Mobility 2-3/4

Journal of Cyber Security and Mobility 2-3/4
Author :
Publisher :
Total Pages : 170
Release :
ISBN-10 : 8793102925
ISBN-13 : 9788793102927
Rating : 4/5 (25 Downloads)

Synopsis Journal of Cyber Security and Mobility 2-3/4 by : Ashutosh Dutta

Aim: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT) and machine-to-machine technologies.

JOURNAL OF CYBER SECURITY AND MOBILITY 4-1

JOURNAL OF CYBER SECURITY AND MOBILITY 4-1
Author :
Publisher :
Total Pages : 96
Release :
ISBN-10 : 8793237669
ISBN-13 : 9788793237667
Rating : 4/5 (69 Downloads)

Synopsis JOURNAL OF CYBER SECURITY AND MOBILITY 4-1 by : Geir M. Køien

The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that the IoT systems we design, develop, and deploy are resilient and trustworthy. Almost universal availability is expected, yet individual devices will routinely fail and/or be compromised. Despite this, the services should be resilient and trustworthy. The environments where the devices will be deployed will range from protected and controlled environments to potentially very hostile environments where the exposure is extreme. The cyber security landscape has changed drastically over the last decade. We have adversaries engaging in cyber warfare, organized crime, indus- trial espionage, petty/opportunistic theft, and privacy invasions. Privacy has become more important, which is by many seen as a prerequisite for human trust in IoT systems. For the IoT systems to remain trustworthy, they need to have credible defenses and be able to detect and respond to incidents. We have four contributions to this special issue. The first contribution, "Torrent-based Dissemination in Infrastructure-less Wireless Networks" by Kyriakos Manousakis et al, has its roots in peer-to-peer mobile ad hoc networks. This contribution highlights robustness in content dissemination in peer-to-peer mobile ad hoc networks. These networks are subject to disruptions due to erratic link performance and intermittent connectivity. The approach used, called SISTO, is a fully distributed and torrent-based solution. The authors highlight four main features: 1) freedom from reliance on infrastructure; 2) network and topology aware selection of information sources; 3) robust multiple-path routing of content via a proactive peer selec- tion technique; and 4) an integrated distributed content discovery capability.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI
Author :
Publisher : Springer
Total Pages : 204
Release :
ISBN-10 : 9783662562666
ISBN-13 : 3662562669
Rating : 4/5 (66 Downloads)

Synopsis Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI by : Abdelkader Hameurlain

This volume, the 36th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains eight revised, extended papers selected from the 3rd International Conference on Future Data and Security Engineering, FDSE 2016, and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016, which were held in Can Tho City, Vietnam, in November 2016. Topics covered include big data analytics, massive dataset mining, security and privacy, cryptography, access control, deep learning, crowd sourcing, database watermarking, and query processing and optimization.