Description

Book Synopsis

We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cy

Table of Contents

1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends

KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA

2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification

FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN

3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework

D. SANTHADEVI AND B. JANET

4 Exploring the possibility of blockchain and smart contract-based digital certificate

P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN

5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range

NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH

6 Addressing the cybersecurity issues in cloud computing

SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD

7 Role of medical image encryption algorithms in cloud platform for teleradiology applications

SIJU JOHN AND S. N. KUMAR

8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things

THULASI M. SANTHI AND M. C. HELEN MARY

9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues

ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA

10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents

MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID

11 A detailed cram on artificial intelligence industrial systems 4.0

P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI

12 Ensuring liveliness property in safety-critical systems

ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR

13 Machine learning for intelligent analytics

JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL

14 Secure 3D route optimization of combat vehicles in war field using IoV

ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA

15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis

B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH

16 Containerization in cloud computing for OS-level virtualization

MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK

17 An adaptive deep learning approach for stock price forecasting

RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA

Advances in Cyber Security and Intelligent

Product form

£94.99

Includes FREE delivery

RRP £99.99 – you save £5.00 (5%)

Order before 4pm tomorrow for delivery by Tue 16 Dec 2025.

A Hardback by Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur

2 in stock


    View other formats and editions of Advances in Cyber Security and Intelligent by Abhishek Verma

    Publisher: CRC Press
    Publication Date: 12/21/2022 12:00:00 AM
    ISBN13: 9781032216003, 978-1032216003
    ISBN10: 103221600X

    Description

    Book Synopsis

    We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cy

    Table of Contents

    1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends

    KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA

    2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification

    FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN

    3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework

    D. SANTHADEVI AND B. JANET

    4 Exploring the possibility of blockchain and smart contract-based digital certificate

    P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN

    5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range

    NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH

    6 Addressing the cybersecurity issues in cloud computing

    SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD

    7 Role of medical image encryption algorithms in cloud platform for teleradiology applications

    SIJU JOHN AND S. N. KUMAR

    8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things

    THULASI M. SANTHI AND M. C. HELEN MARY

    9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues

    ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA

    10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents

    MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID

    11 A detailed cram on artificial intelligence industrial systems 4.0

    P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI

    12 Ensuring liveliness property in safety-critical systems

    ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR

    13 Machine learning for intelligent analytics

    JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL

    14 Secure 3D route optimization of combat vehicles in war field using IoV

    ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA

    15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis

    B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH

    16 Containerization in cloud computing for OS-level virtualization

    MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK

    17 An adaptive deep learning approach for stock price forecasting

    RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account