Advances in Security, Networks, and Internet of Things by Leonidas Deligiannidis
Home > Technology & Engineering > Electronics & communications engineering > Electronics engineering > Electronic devices & materials > Advances in Security, Networks, and Internet of Things
Advances in Security, Networks, and Internet of Things

Advances in Security, Networks, and Internet of Things


     0     
5
4
3
2
1



International Edition


About the Book

Statistical Analysis of Prime Number Generators Putting Encryption at Risk.- Secure Authentication Protocol for Drones in LTE Networks.- Memorable Password Generation with AES in ECB Mod.- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model.- Suitability of Voice Recognition within the IoT Environment.- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World.- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies.- Phishing Prevention Using Defense in Depth.- Phishing Detection using Deep Learning.- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach.- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack.- Intrusion Detection through Gradient in Digraphs.- A Practice of Detecting Insider Threats within a Network.- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications.- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in Cyber Security.- Enhancing the Cybersecurity Education Curricula Through Quantum Computation.- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program.- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics.- A Posteriori Access Control with an Administrative Policy.- An Analysis of Applying STIR/Shaken to Prevent Robocalls.- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid.- Vulnerability Analysis of 2500 Docker Hub Images.- Analysis of Conpot and its BACnet Features for Cyber-Deception.- Automotive Vehicle Security Metrics.- Requirements for IoT Forensic Models - A Review.- Mobile Malware Forensics Review: Issues and Challenges.- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review.- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach.- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices.- Leveraging Security Management with Low-Level System Monitoring and Visualization.- Lightweight Network Steganography for Distributed Electronic Warfare System Communications.- Security of DBMSs.- Static Analysis for Software Reliability and Security.


About the Author: Professor Kevin Daimi received his Ph.D. from the University of Cranfield, England. He has a long work experience in academia and industry. His industry experience includes working as Senior Programmer/Systems Analyst, Computer Specialist, and Computer Consultant. He is currently Professor of Computer Science and Software Engineering at the University of Detroit Mercy. His research interests include Computer and Network Security with emphasis on vehicle network security, Software Engineering, Data Mining, and Computer Science and Software Engineering Education. He has published a number of papers on vehicle security. Two of his publications received the Best Paper Award from two international conferences. He is the editor of Computer and Network Security Essentials book, which was published by Springer. He has been chairing the annual International Conference on Security and Management (SAM) since 2012. Kevin is a Senior Member of the Association for Computing Machinery (ACM), a Senior Member of the Institute of Electrical and Electronic Engineers (IEEE), and a Fellow of the British Computer Society (BCS). He served as a Program Committee member for many international conferences and chaired some of them. He is also the recipient of the Outstanding Achievement Award in Recognition and Appreciation of his Leadership, Service and Research Contributions to the Field of Network Security, from the 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE).

Professor Hamid R. Arabnia received a Ph.D. degree in Computer Science from the University of Kent (England) in 1987. He is currently a Professor Emeritus of Computer Science at University of Georgia, USA, where he has been since October 1987. His research interests include parallel and distributed processing techniques & algorithms, supercomputing, Data Science, imaging science, and other compute intensive problems. Applications of interest include: medical imaging and security. Most recent activities include: Studying ways to promote legislation that would prevent cyber-stalking, cyber-harassment, and cyber-bullying. As a victim of cyber-harassment and cyber-bullying, in 2017 he won a lawsuit with damages awarded to him for a total of $2.3 Million and $656K attorney costs. Since this court case was one of the few cases of its kind in the United States, this ruling is considered to be important; Final Judgement for damages was issued in Leon County Courthouse of Tallahassee in Florida by Circuit Court Judge. Prof. Arabnia is Editor-in-Chief of The Journal of Supercomputing (Springer). He is also on the editorial and advisory boards of 30 other journals. He is the book series editor-in-chief of "Transactions of Computational Science and Computational Intelligence" (Springer). He has won 12 distinguished awards, including the "Outstanding Research Contributions to the Field of Supercomputing" (President of IEEE/SMC) and "Distinguished Research Award" for Outstanding Contributions to Adaptable Communication Systems (ACM SIGAPP IMCOM). Dr. Arabnia is Fellow and Advisor of Center of Excellence in Terrorism, Resilience, Intelligence & Organized Crime Research (CENTRIC). He has been a PI/Co-PI on about $8 Million externally funded projects, about $200K internally funded projects, and about $4 Million equipment grants. During his tenure as Director of Graduate Programs, Dr. Arabnia secured the largest level of funding in the history of the department for supporting the research and education of graduate students (PhD, MS). Dr. Arabnia has delivered a number of keynote and plenary lectures at international conferences; most recently at: The 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS, Australia); International Conference on Future Generation Communication and Networking (FGCN / IEEE CS, Sanya); The 10th IEEE International Conference on High Performance Computing and Communications (HPCC, Dalian); and ACM IMCOM International Conference. He has also delivered a number of "distinguished lectures" at various universities and research units/centers (USA, Spain, South Korea, Japan, Iran, Saudi Arabia, UK, Canada, Turkey, China, Ireland, Australia, ...); his distinguished lectures were funded and sponsored by US Department of Defense, SERSC of Republic of Korea, US National Science Foundation, H2020 of Europe, and others.

Dr. Leonidas Deligiannidis is a Professor of Computer Science at Wentworth Institute of Technology in Boston, MA. His foundation in Computer Science was first established when he earned his B.S. from Northeastern University College of Computer Science. He then went on to obtain two advanced degrees in the field from Tufts University. He has been active in the field since then, investigating subjects like Brain Computer Interfaces, Security, Business-oriented visualizations, and STEM Education. He has also served in industrial positions outside the scope of his academic work, using his acumen for several companies. His industry experience includes both entrepreneur startups in healthcare and high-tech networking companies. He has received multiple awards for his efforts, including multiple Achievement Awards for his contributions to Imaging Science by the World Congress in Computer Science, Computer Engineering, and Applied Computing, IEEE best paper awards, as well as a University Presidential award for his scholarly achievements. In addition, he has served as a referee for many journals in computer science and is a member of the program and organizing committees for notable conferences in his field.

Min-Shiang Hwang received the B.S. in electronic engineering from the National Taipei Institute of Technology, Taipei, Taiwan, in 1980; the M.S. in industrial engineering from the National Tsing Hua University, Taiwan in 1988; and the Ph.D. degree in computer and information science from the National Chiao Tung University, Taiwan in 1995. He also studied applied mathematics at the National Cheng Kung University, Taiwan, from 1984-1986. He passed the National Telecommunication Special Examination in field "information engineering", qualified as the first class advanced technician in 1990. From 1988 to 1991, he was the leader of the Computer Center at Telecommunication Laboratories, Ministry of Transportation and Communications. He was also the Chairman of the Department of Information Management, Chaoyang University of Technology (CYUT), Taiwan, during 1999-2002. He was a professor and Chairman of the Graduate Institute of Networking and Communications, CYUT, during 2002-2003. He was a professor and Chairman of the Department of Management Information Systems, NCHU, during 2003-2009. He was also a visiting professor with University of California (UC), Riverside and UC. Davis (USA) during 2009-2010. He was a distinguished professor of the Department of Management Information Systems, NCHU, during 2007-2011. He obtained the 1997, 1998, 1999, 2000, and 2001 Excellent Research Award of National Science Council (Taiwan). Dr. Hwang was a dean of College of Computer Science, Asia University (AU), Taichung, Taiwan. He is currently a chair professor with the Department of Computer Science and Information Engineering, AU, and an Editor-In-Chief of International Journal of Network Security (EI Compendex). He is a chairman of Sina Smart Computing Institute. His current research interests include cryptography, blockchain technology, steganography, network and communication security, and AI security. Dr. Hwang has published over 200+ articles on the above research fields in international journals.

Fernando G. Tinetti has a PhD in Computer Science and is a Professor at Facultad de Informatica, Universidad Nacional de La Plata, La Plata, Argentina. He is also a researcher of the Comision Investigaciones Cientificas de la Provincia de Buenos Aires, Argentina. He is a recipient of the NSF-TCPP Early Adopter Award, NSF/IEEE-TCPP, Curriculum Initiative on Parallel and Distributed Computing. He is the author/co-author of more than one hundred papers in International Journals and Computer Science Conferences. His areas of interest and experience include: High Performance Computing, Parallel and Distributed Computing, Cloud and Edge Computing, Real-Time Systems and Applications, Big Data Processing, Data Center and Infrastructure Performance Evaluation, Robotic Systems and Applications. He has co-edited a number of books in HPC.


Best Sellers



Product Details
  • ISBN-13: 9783030710163
  • Publisher: Springer International Publishing
  • Publisher Imprint: Springer
  • Height: 234 mm
  • No of Pages: 874
  • Series Title: Transactions on Computational Science and Computational Inte
  • Sub Title: Proceedings from Sam'20, Icwn'20, Icomp'20, and Escs'20
  • Width: 156 mm
  • ISBN-10: 3030710165
  • Publisher Date: 14 May 2021
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Spine Width: 48 mm
  • Weight: 1472 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Advances in Security, Networks, and Internet of Things
Springer International Publishing -
Advances in Security, Networks, and Internet of Things
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Advances in Security, Networks, and Internet of Things

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!