Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice

Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice
Author :
Publisher :
Total Pages : 134
Release :
ISBN-10 : 8793237219
ISBN-13 : 9788793237216
Rating : 4/5 (19 Downloads)

Synopsis Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice by : Jiang Bian

We are now in the era of the Big Data revolution where nearly every aspect of computing engineering is driven by increasingly large, complex, and diverse datasets. Big Data presents not only a world of new opportunities but also new challenges. With threats multiplying exponentially, the ability to gather and analyze massive information will be a decisive factor in the battle against malicious software and adversaries. It is natural to consider a cloud-computing environment to address the computational requirements for big data analytic applications. However, it is equally important to address the security concerns in terms of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In this special issue of JCSM on Big Data, the article by Miller et al. focuses on technical and policy infrastructure for digital forensic analysis in the cloud as cyber-crime is a growing trend around the world. Further, the massive collections of imagery on the Internet have inspired a stream of interesting work on image processing related big data topics. The article by Shen et al. describes their novel structure-based image completion algorithm for object removal while maintaining visually plausible content with consistent structure and scene texture in photos. Such novel technique can benefit a diverse range of applications, from image restoration, to privacy protection, to photo localization. A surge of graph-computing frameworks has appeared in both academia and industry to address the needs of processing complex and large graph-structured datasets, where each has its respective benefits and drawbacks. Leveraging the right platform for the right task is daunting for users of these frameworks. A review by Zhao et al. provides the context for selecting the right graph-parallel processing framework given the tasks in hand. They have studied several popular distributed graph-computing systems aiming to reveal the characteristics of those systems in performing common graph algorithms with real-world datasets. Their findings are extremely informative.

Cyber-Physical Systems

Cyber-Physical Systems
Author :
Publisher : CRC Press
Total Pages : 579
Release :
ISBN-10 : 9781482263336
ISBN-13 : 1482263335
Rating : 4/5 (36 Downloads)

Synopsis Cyber-Physical Systems by : Danda B. Rawat

Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must for researchers, practitioners, system designers, policy makers, system managers, and administrators, there has been a need for a comprehensive and up-to-date source of research and information on cyber-physical systems. This book fills that need.Cyber-Physical Syst

Big Data, Cloud Computing and IoT

Big Data, Cloud Computing and IoT
Author :
Publisher : CRC Press
Total Pages : 259
Release :
ISBN-10 : 9781000862362
ISBN-13 : 1000862364
Rating : 4/5 (62 Downloads)

Synopsis Big Data, Cloud Computing and IoT by : Sita Rani

Cloud computing, the Internet of Things (IoT), and big data are three significant technological trends affecting the world's largest corporations. This book discusses big data, cloud computing, and the IoT, with a focus on the benefits and implementation problems. In addition, it examines the many structures and applications pertinent to these disciplines. Also, big data, cloud computing, and the IoT are proposed as possible study avenues. Features: Informs about cloud computing, IoT and big data, including theoretical foundations and the most recent empirical findings Provides essential research on the relationship between various technologies and the aggregate influence they have on solving real-world problems Ideal for academicians, developers, researchers, computer scientists, practitioners, information technology professionals, students, scholars, and engineers exploring research on the incorporation of technological innovations to address contemporary societal challenges

Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security

Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security
Author :
Publisher :
Total Pages : 148
Release :
ISBN-10 : 8793237057
ISBN-13 : 9788793237056
Rating : 4/5 (57 Downloads)

Synopsis Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security by : Roger Piqueras Jover

The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice and short messaging traffic for billions of users. This new cellular communication system is the natural evolution of 3rd Generation Partnership Project (3GPP)-based access networks, enhancing the Universal Mobile Telecommunications System (UMTS). LTE introduces a substantial redesign of the network architecture resulting in the new eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and the EPC (Enhanced Packet Core). In this context, the LTE Radio Access Network (RAN) is built upon a redesigned physical layer and based on an Orthogonal Frequency Division Multiple Access (OFDMA) modulation, which features robust performance in challenging multipath environments and substantially improves spectrum efficiency and capacity. Moreover, the new all-IP core architecture is designed to be more flexible and flatter, with a logical separation of the traffic related functions and the control and signaling functions. Over the last few years, researchers have published and presented potential vulnerabilities and attacks against the second generation of mobile networks, the Global System for Mobile Communications (GSM). Although technology, encryption schemes and security in general have drastically improved in LTE with respect of legacy GSM networks, security research should continue proactively working towards secure and resilient mobile communication systems. In this context, the cyber-security landscape has changed drastically over the last few years. It is now characterized by large scale security threats and the advent of sophisticated intrusions. These new threats illustrate the importance of strengthening the resiliency of mobility networks against security attacks, ensuring this way full mobility network availability. This special issue of the Journal of Cyber Security and Mobility addresses research advances in mobility security for LTE next generation mobility networks and other wireless communication systems. Two of the papers in this special issue analyze the threat of radio jamming. Lichtman et al. introduce a sophisticated reinforcement learning anti-jamming technique aimed at protecting frequency hopping wireless systems from jamming attacks while maximizing link throughput. Similarly, Kornemann et al. introduce a jamming detection mechanism for Wireless Sensor Networks (WSN), which are known to be substantially vulnerable to this type of attack. Focusing specifically on LTE mobile networks, Jermyn et al. perform a thorough simulation analysis of potential Denial of Service attacks against the eUTRAN by means of a botnet of malware-infected mobile terminals saturating the radio interface with large amounts of traffic. This type of malware infections and the connections of such a botnet to the malicious command and control servers could be detected with the system introduced by Bickford et al. This advanced detection scheme is capable to detect malicious activity in mobile terminals and proceed to mitigate and block the malicious applications. Finally, Alzahrani et al. present a very detailed and thorough analysis of the security research published over the last few years on mobile malware analysis, detection and mitigation. The valuable insights in this paper set a common ground and framework to facilitate research in this area, as well as to share results and easily replicate experiments.

Current and Emerging Trends in Cyber Operations

Current and Emerging Trends in Cyber Operations
Author :
Publisher : Springer
Total Pages : 254
Release :
ISBN-10 : 9781137455550
ISBN-13 : 1137455551
Rating : 4/5 (50 Downloads)

Synopsis Current and Emerging Trends in Cyber Operations by : Frederic Lemieux

This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.

Human Dynamics Research in Smart and Connected Communities

Human Dynamics Research in Smart and Connected Communities
Author :
Publisher : Springer
Total Pages : 250
Release :
ISBN-10 : 9783319732473
ISBN-13 : 3319732471
Rating : 4/5 (73 Downloads)

Synopsis Human Dynamics Research in Smart and Connected Communities by : Shih-Lung Shaw

This book addresses how accelerating advances in information and communication technology, mobile technology, and location-aware technology have fundamentally changed the ways how social, political, economic and transportation systems work in today’s globally connected world. It delivers on many exciting research questions related to human dynamics at both disaggregate and aggregate levels that attract the attention of researchers from a wide range of disciplines. Human Dynamics Research involves theoretical perspectives, space-time analytics, modeling human dynamics, urban analytics, social media and big data, travel dynamics, privacy issues, development of smart cities, and problems and prospects of human dynamics research. This book includes contributions on theoretical, technical, or application aspects of human dynamics research from different disciplines. Appealing to researchers, scholars and students across a wide range of topics and disciplines including: urban studies, space-time, mobility and the internet, social media, big data, behavioral geography and spatio-temporal-network visualization, this book offers a glimpse at the cutting edge of research on human dynamics.

Security of Internet of Things Nodes

Security of Internet of Things Nodes
Author :
Publisher : CRC Press
Total Pages : 321
Release :
ISBN-10 : 9781000421729
ISBN-13 : 1000421724
Rating : 4/5 (29 Downloads)

Synopsis Security of Internet of Things Nodes by : Chinmay Chakraborty

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

The Effect of Information Technology on Business and Marketing Intelligence Systems

The Effect of Information Technology on Business and Marketing Intelligence Systems
Author :
Publisher : Springer Nature
Total Pages : 2536
Release :
ISBN-10 : 9783031123825
ISBN-13 : 3031123824
Rating : 4/5 (25 Downloads)

Synopsis The Effect of Information Technology on Business and Marketing Intelligence Systems by : Muhammad Alshurideh

Business shapes have been changed these days. Change is the main dominant fact that change the way of business operations running. Topics such as innovation, entrepreneurship, leadership, blockchain, mobile business, social media, e-learning, machine learning, and artificial intelligence become essential to be considered by each institution within the technology era. This book tries to give additional views on how technologies influence business and marketing operations for insuring successful institutions survival. The world needs to develop management and intelligent business scenario plans that suite a variety of crisis appears these days. Also, business and marketing intelligence should meet government priorities in individual countries and minimise the risk of business disruptions. Business intelligence - the strategies and technology companies that use it to collect, interpret, and benefit from data - play a key role in informing company strategies, functions, and efficiency. However, being essential to the success, many companies are not taking advantage of tools that can improve their business intelligence efforts. Information technology become a core stone in business. For example, the combination of machine learning and business intelligence can have a far-reaching impact on the insights the company gets from its available data to improve productivity, quality, customer service and more. This book is important because it introduces a large number of chapters that discussed the implications of different Information technology applications in business. This book contains a set of volumes which are: 1- Social Marketing and Social Media Applications, 2- Social Marketing and Social Media Applications, 3- Business and Data Analytics, 4- Corporate governance and performance, 5- Innovation, Entrepreneurship and leadership, 6- Knowledge management, 7- Machine learning, IOT, BIG DATA, Block Chain and AI, 8- Marketing Mix, Services and Branding.

Artificial Intelligence and International Conflict in Cyberspace

Artificial Intelligence and International Conflict in Cyberspace
Author :
Publisher : Taylor & Francis
Total Pages : 208
Release :
ISBN-10 : 9781000895957
ISBN-13 : 1000895955
Rating : 4/5 (57 Downloads)

Synopsis Artificial Intelligence and International Conflict in Cyberspace by : Fabio Cristiano

This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace. Over the past three decades, cyberspace developed into a crucial frontier and issue of international conflict. However, scholarly work on the relationship between AI and conflict in cyberspace has been produced along somewhat rigid disciplinary boundaries and an even more rigid sociotechnical divide – wherein technical and social scholarship are seldomly brought into a conversation. This is the first volume to address these themes through a comprehensive and cross-disciplinary approach. With the intent of exploring the question ‘what is at stake with the use of automation in international conflict in cyberspace through AI?’, the chapters in the volume focus on three broad themes, namely: (1) technical and operational, (2) strategic and geopolitical and (3) normative and legal. These also constitute the three parts in which the chapters of this volume are organised, although these thematic sections should not be considered as an analytical or a disciplinary demarcation. This book will be of much interest to students of cyber-conflict, AI, security studies and International Relations. The Open Access version of this book is available for free in PDF format as Open Access from the individual product page at www.routledge.com. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.