libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

daimi kevin (curatore); arabnia hamid r. (curatore); deligiannidis leonidas (curatore); hwang min-shiang (curatore); tinetti fernando g. (curatore) - advances in security, networks, and internet of things

Advances in Security, Networks, and Internet of Things Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20

; ; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
302,98 €
NICEPRICE
287,83 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 07/2021
Edizione: 1st ed. 2021





Trama

The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students.

  • Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20);
  • Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems;
  • Features papers from SAM’20, ICWN’20, ICOMP’20 and ESCS’20.





Sommario

Statistical Analysis of Prime Number Generators Putting Encryption at Risk.- Secure Authentication Protocol for Drones in LTE Networks.- Memorable Password Generation with AES in ECB Mod.- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model.- Suitability of Voice Recognition within the IoT Environment.- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World.- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies.- Phishing Prevention Using Defense in Depth.- Phishing Detection using Deep Learning.- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach.- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack.- Intrusion Detection through Gradient in Digraphs.- A Practice of Detecting Insider Threats within a Network.- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications.- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in Cyber Security.- Enhancing the Cybersecurity Education Curricula Through Quantum Computation.- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program.- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics.- A Posteriori Access Control with an Administrative Policy.- An Analysis of Applying STIR/Shaken to Prevent Robocalls.- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid.- Vulnerability Analysis of 2500 Docker Hub Images.-  Analysis of Conpot and its BACnet Features for Cyber-Deception.- Automotive Vehicle Security Metrics.- Requirements for IoT Forensic Models - A Review.- Mobile Malware Forensics Review: Issues and Challenges.- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review.- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach.- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices.- Leveraging Security Management with Low-Level System Monitoring and Visualization.- Lightweight Network Steganography for Distributed Electronic Warfare System Communications.- Security of DBMSs.- Static Analysis for Software Reliability and Security.





Autore

Professor Kevin Daimi received his Ph.D. from the University of Cranfield, England.  He has a long work experience in academia and industry.  His industry experience includes working as Senior Programmer/Systems Analyst, Computer Specialist, and Computer Consultant. He is currently Professor of Computer Science and Software Engineering at the University of Detroit Mercy. His research interests include Computer and Network Security with emphasis on vehicle network security, Software Engineering, Data Mining, and Computer Science and Software Engineering Education.  He has published a number of papers on vehicle security. Two of his publications received the Best Paper Award from two international conferences. He is the editor of Computer and Network Security Essentials book, which was published by Springer. He has been chairing the annual International Conference on Security and Management (SAM) since 2012. Kevin is a Senior Member of the Association for Computing Machinery (ACM), a Senior Member of the Institute of Electrical and Electronic Engineers (IEEE), and a Fellow of the British Computer Society (BCS). He served as a Program Committee member for many international conferences and chaired some of them.  He is also the recipient of the Outstanding Achievement Award in Recognition and Appreciation of his Leadership, Service and Research Contributions to the Field of Network Security, from the 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE).

 

Professor Hamid R. Arabnia received a Ph.D. degree in Computer Science from the University of Kent (England) in 1987. He is currently a Professor Emeritus of Computer Science at University of Georgia, USA, where he has been since October 1987. His research interests include parallel and distributed processing techniques & algorithms, supercomputing, Data Science, imaging science, and other compute intensive problems. Applications of interest include: medical imaging and security. Most recent activities include: Studying ways to promote legislation that would prevent cyber-stalking, cyber-harassment, and cyber-bullying. As a victim of cyber-harassment and cyber-bullying, in 2017 he won a lawsuit with damages awarded to him for a total of $2.3 Million and $656K attorney costs. Since this court case was one of the few cases of its kind in the United States, this ruling is considered to be important; Final Judgement for damages was issued in Leon County Courthouse of Tallahassee in Florida by Circuit Court Judge. Prof. Arabnia is Editor-in-Chief of The Journal of Supercomputing (Springer). He is also on the editorial and advisory boards of 30 other journals. He is the book series editor-in-chief of "Transactions of Computational Science and Computational Intelligence" (Springer). He has won 12 distinguished awards, including the "Outstanding Research Contributions to the Field of Supercomputing" (President of IEEE/SMC) and "Distinguished Research Award" for Outstanding Contributions to Adaptable Communication Systems (ACM SIGAPP IMCOM). Dr. Arabnia is Fellow and Advisor of Center of Excellence in Terrorism, Resilience, Intelligence & Organized Crime Research (CENTRIC). He has been a PI/Co-PI on about $8 Million externally funded projects, about $200K internally funded projects, and about $4 Million equipment grants. During his tenure as Director of Graduate Programs, Dr. Arabnia secured the largest level of funding in the history of the department for supporting the research and education of graduate students (PhD, MS). Dr. Arabnia has delivered a number of keynote and plenary lectures at international conferences; most recently at: The 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS, Australia); International Conference on Future Generation Communication and Networking (FGCN / IEEE CS, Sanya); The 10th IEEE International Conference on High Performance Computing and Communications (HPCC, Dalian); and ACM IMCOM International Conference. He has also delivered a number of "distinguished lectures" at various universities and research units/centers (USA, Spain, South Korea, Japan, Iran, Saudi Arabia, UK, Canada, Turkey, China, Ireland, Australia, ...); his distinguished lectures were funded and sponsored by US Department of Defense, SERSC of Republic of Korea, US National Science Foundation, H2020 of Europe, and others.

 

Dr. Leonidas Deligiannidis is a Professor of Computer Science at Wentworth Institute of Technology in Boston, MA. His foundation in Computer Science was first established when he earned his B.S. from Northeastern University College of Computer Science. He then went on to obtain two advanced degrees in the field from Tufts University. He has been active in the field since then, investigating subjects like Brain Computer Interfaces, Security, Business-oriented visualizations, and STEM Education. He has also served










Altre Informazioni

ISBN:

9783030710163

Condizione: Nuovo
Collana: Transactions on Computational Science and Computational Intelligence
Dimensioni: 235 x 155 mm Ø 1508 gr
Formato: Copertina rigida
Illustration Notes:XXVI, 874 p. 327 illus., 240 illus. in color.
Pagine Arabe: 874
Pagine Romane: xxvi


Dicono di noi