Chronologie aller Bände (1 - 4)
Die Reihenfolge beginnt mit dem Buch "Blockchain Cybersecurity, Trust and Privacy". Wer alle Bücher der Reihe nach lesen möchte, sollte mit diesem Band von Kim-Kwang Raymond Choo beginnen. Der zweite Teil der Reihe "Blockchain Cybersecurity, Trust and Privacy" ist am 02.03.2020 erschienen. Mit insgesamt 4 Bänden wurde die Reihe über einen Zeitraum von ungefähr 6 Jahren fortgesetzt. Der neueste Band trägt den Titel "Foundations of Cyber Deception".
- Anzahl der Bewertungen für die gesamte Reihe: 2
- Ø Bewertung der Reihe: 2
- Start der Reihe: 02.03.2020
- Neueste Folge: 21.12.2025
Diese Reihenfolge enthält 4 unterschiedliche Autoren.
- Autor: Choo, Kim-Kwang Raymond
- Anzahl Bewertungen: 1
- Ø Bewertung: 2.0
- Medium: Buch
- Veröffentlicht: 03.03.2020
- Genre: Sonstiges
Blockchain Cybersecurity, Trust and Privacy
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace.
Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data.
Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP’s issues in the digital world. Topics of interest for this book include but not limited to:
- Blockchain-based authentication, authorization and accounting mechanisms
- Applications of blockchain technologies in digital forensic and threat hunting
- Blockchain-based threat intelligence and threat analytics techniques
- Formal specification of smart contracts
- Automated tools for outsmarting smart contracts
- Security and privacy aspects of blockchain technologies
- Vulnerabilities of smart contracts
- Blockchain for securing cyber infrastructure and internet of things networks
- Blockchain-based cybersecurity education systems
This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data willfind this book useful as well.
- Autor: Boulila, Wadii
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Buch
- Veröffentlicht: 22.02.2024
- Genre: Sonstiges
Decision Making and Security Risk Management for IoT Environments
The Internet of Things (IoT) refers to a network of tiny devices linked to the Internet or other communication networks. IoT is gaining popularity, because it opens up new possibilities for developing many modern applications. This would include smart cities, smart agriculture, innovative healthcare services and more. The worldwide IoT market surpassed $100 billion in sales for the first time in 2017, and forecasts show that this number might reach $1.6 trillion by 2025. However, as IoT devices grow more widespread, threats, privacy and security concerns are growing. The massive volume of data exchanged highlights significant challenges to preserving individual privacy and securing shared data. Therefore, securing the IoT environment becomes difficult for research and industry stakeholders.
Researchers, graduate students and educators in the fields of computer science, cybersecurity, distributed systems and artificial intelligence will want to purchase this book. It will also be a valuable companion for users and developers interested in decision-making and security risk management in IoT environments.
- Autor: Zhu, Quanyan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Buch
- Veröffentlicht: 21.12.2025
- Genre: Sonstiges
Foundations of Cyber Deception
This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges. It highlights the dynamic and interdisciplinary nature of cyber deception research, offering insights into diverse application areas such as industrial control systems and AI security.
Cyber deception has emerged as a critical strategy for defending digital assets across academia, industry, and government. By creating false information, deceptive environments, or misleading signals, it aims to confuse, delay, or misdirect adversaries while simultaneously gathering intelligence on their tactics. This proactive approach shifts the traditional information advantage from attackers to defenders, strengthening cybersecurity resilience.
Designed as a foundational resource, this book is particularly valuable for students and early-career researchers seeking to understand cyber deception and identify pressing research challenges. It emphasizes the need for context-aware and adaptive strategies to counter the ever-evolving tactics of cyber adversaries. Furthermore, this book advocates for leveraging emerging technologies and interdisciplinary approaches to advance deception techniques. By addressing both current and future challenges, this volume provides a comprehensive roadmap for enhancing cyber deception strategies and fostering the development of more robust and resilient cybersecurity defences.
- Band: 86
- Autor: Karbab, ElMouatez Billah
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Buch
- Veröffentlicht: 12.07.2022
- Genre: Sachbuch
Android Malware Detection using Machine Learning
First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Basedon this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware.
The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques.
Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.



