Blockchain for Cybersecurity and Privacy -Bookswagon
Blockchain for Cybersecurity and Privacy

Blockchain for Cybersecurity and Privacy


     0     
5
4
3
2
1



International Edition


About the Book

Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future.

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity and privacy. The purpose of this book is to improve the awareness of readers about blockchain technology applications for cybersecurity and privacy. This book focuses on the fundamentals, architectures, and challenges of adopting blockchain for cybersecurity. Readers will discover different applications of blockchain for cybersecurity in IoT and healthcare. The book also includes some case studies of the blockchain for e-commerce online payment, retention payment system, and digital forensics.

The book offers comprehensive coverage of the most essential topics, including:

  • Blockchain architectures and challenges
  • Blockchain threats and vulnerabilities
  • Blockchain security and potential future use cases
  • Blockchain for securing Internet of Things
  • Blockchain for cybersecurity in healthcare
  • Blockchain in facilitating payment system security and privacy

This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in the fields of blockchain technology and cybersecurity. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on the blockchain for cybersecurity and privacy.
About the Author:

Yassine Maleh is a PhD of the University Hassan 1st in Morocco in the field of Internet of Things Security and privacy, since 2013. He is Senior Member of IEEE, Member of the International Association of Engineers IAENG and The Machine Intelligence Research Labs. Dr Maleh has made contributions in the fields of information security and privacy, Internet of Things Security, Wireless and Constrained Networks Security. His research interests include Information Security and Privacy, Internet of Things, Networks Security, Information system and IT Governance. He has published over than 50 papers (Book chapters, international journals and conferences/workshops), and 3 edited books and 1 authored book. He is the editor in chief of the International Journal of Smart Security Technologies (IJSST). He serves as an Associate Editor for IEEE Access (2019 Impact Factor 4.098), the International Journal of Digital Crime and Forensics (IJDCF) and the International Journal of Information Security and Privacy (IJISP). He was also a Guest Editor of a special issue on Recent Advances on Cyber Security and Privacy for Cloud-of-Things of the International Journal of Digital Crime and Forensics (IJDCF), Volume 10, Issue 3, July-September 2019. He has served and continues to serve on executive and technical program committees and as a reviewer of numerous international conference and journals such as Elsevier Ad Hoc Networks, IEEE Network Magazine, IEEE Sensor Journal, ICT Express, and Springer Cluster Computing. He was the Publicity chair of BCCA 2019 and the General Chair of the MLBDACP 19 symposium.

Mamoun Alazab is the Associate Professor in the College of Engineering, IT and Environment at Charles Darwin University, Australia. He received his Ph.D. degree is in Computer Science from the Federation University of Australia, School of Science, Information Technology and Engineering. He is a cyber security researcher and practitioner with industry and academic experience. Dr Alazab's research is multidisciplinary that focuses on cyber security and digital forensics of computer systems including current and emerging issues in the cyber environment like cyber-physical systems and the internet of things, by taking into consideration the unique challenges present in these environments, with a focus on cybercrime detection and prevention. He looks into the intersection use of machine learning as an essential tool for cybersecurity, for example, for detecting attacks, analyzing malicious code or uncovering vulnerabilities in software. He has more than 100 research papers. He is the recipient of short fellowship from Japan Society for the Promotion of Science (JSPS) based on his nomination from the Australian Academy of Science. He delivered many invited and keynote speeches, 27 events in 2019 alone. He convened and chaired more than 50 conferences and workshops. He is the founding chair of the IEEE Northern Territory Subsection: (Feb 2019 - current). He is a Senior Member of the IEEE, Cybersecurity Academic Ambassador for Oman's Information Technology Authority (ITA), Member of the IEEE Computer Society's Technical Committee on Security and Privacy (TCSP) and has worked closely with government and industry on many projects, including IBM, Trend Micro, the Australian Federal Police (AFP), the Australian Communications and Media Authority (ACMA), Westpac, UNODC, and the Attorney General's Department.

Mohammad Shojafar received his PhD in Information Communication and Telecommunications (advisor Prof. Enzo Baccarelli) from Sapienza University of Rome, Italy as the second rank university in QS Ranking in Italy and top 100 in the world with an Excellent degree in May 2016. He is Intel Innovator, Senior IEEE member, and Senior Lecturer in the 5GIC/ICS at the University of Surrey, Guildford, UK. Before joint to 5GIC, he was served as a Senior Member in the Computer Department at the University of Ryerson, Toronto, Canada. He was Senior Researcher (Researcher Grant B) and a Marie Curie Fellow in the SPRITZ Security and Privacy Research group at the University of Padua, Italy. Also, he was a Senior Researcher in the Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT) partner at the University of Rome Tor Vergata contributed to 5g PPP European H2020 ``SUPERFLUIDITY'' project for 14 months. Dr. Mohammad was principle investigator on PRISENODE project, a 275,000 euro Horizon 2020 Marie Curie project in the areas of network security and Fog computing and resource scheduling collaborating between the University of Padua and University of Melbourne. He also was a principal investigator on an Italian SDN security and privacy (60,000 euro) supported by the University of Padua in 2018. He was contributed to some Italian projects in telecommunications like GAUChO - A Green Adaptive Fog Computing and Networking Architecture (400,000 euro), S2C: Secure, Software-defined Cloud (30,000 euro), and SAMMClouds- Secure and Adaptive Management of Multi-Clouds (30,000 euro) collaborating among Italian universities. His main research interest is in the area of Network and Network Security and Privacy. In this area, he published more than 100+ papers in topmost international peer-reviewed journals and conferences, e.g., IEEE TCC, IEEE TNSM, IEEE TGCN, IEEE TSUSC, IEEE Network, IEEE SMC, IEEE PIMRC, and IEEE ICC/GLOBECOM. He served as a PC member of several prestigious conferences, including IEEE INFOCOM Workshops in 2019, IEEE GLOBECOM, IEEE ICC, IEEE ICCE, IEEE UCC, IEEE SC2, IEEE ScalCom, and IEEE SMC. He was a General Chair in FMEC 2019, INCoS 2019, INCoS 2018, and a Technical Program Chair in IEEE FMEC 2020. He served as an Associate Editor in IEEE Transactions on Consumer Electronics, IET Communication, Springer Cluster Computing, KSII - Transactions on Internet and Information Systems, Tylor & Francis International Journal of Computers and Applications (IJCA), and Ad Hoc & Sensor Wireless Networks Journals.

Imed Romdhani is a full-time Associate Professor in networking at Edinburgh Napier University since June 2005. He was awarded his Ph.D. from the University of Technology of Compiegne (UTC), France in May 2005. He also holds engineering and a Master degree in networking obtained respectively in 1998 and 2001 from the National School of Computing (ENSI, Tunisia) and Louis Pasteur University (ULP, France). He worked extensively with Motorola Research Labs in Paris and authored 4 patents.

  • Member of Huawei ICT Academy Advisory Board (https: //www.huaweiacad.com)
  • Member of Africa Universities Fund Advisory Board (https: //aufusa.org)
  • Module Leader of a set of Advanced Networking modules
  • Module Leader of the MSc Dissertation Project module
  • An active member of the Internet Engineering Task Force (IETF)
  • Founder and CEO of Digital Tunisia
  • Founder of the Student PPMS Project (www.studentppms.com)
  • Higher Education Expert at E-Taalim (www.e-taalim.com)
  • Specialities: IoT, IPv6, Wireless and Mobile Networking, Multicast Communication, Vehicular and Mesh
  • Networks, Wireless Sensor Networks, Fellowship of the UK Higher Education Academy, PRINCE2 certified.


Best Sellers



Product Details
  • ISBN-13: 9780367473587
  • Publisher: Taylor and Francis
  • Publisher Imprint: CRC Press
  • Height: 234 mm
  • No of Pages: 384
  • Series Title: Internal Audit and It Audit
  • Sub Title: Architectures, Challenges, and Applications
  • Width: 156 mm
  • ISBN-10: 0367473585
  • Publisher Date: 03 Aug 2020
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 24 mm
  • Weight: 793 gr


Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Blockchain for Cybersecurity and Privacy
Taylor and Francis -
Blockchain for Cybersecurity and Privacy
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Blockchain for Cybersecurity and Privacy

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!