Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media

Author: Cyril Onwubiko

Publisher: Springer Nature

Published: 2023-03-07

Total Pages: 476

ISBN-13: 9811964149

DOWNLOAD EBOOK

This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters “Municipal Cybersecurity—A Neglected Research Area? A Survey of Current Research", "The Transnational Dimension of Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.


Security Designs for the Cloud, IoT, and Social Networking

Security Designs for the Cloud, IoT, and Social Networking

Author: Dac-Nhuong Le

Publisher: John Wiley & Sons

Published: 2019-11-05

Total Pages: 296

ISBN-13: 1119592267

DOWNLOAD EBOOK

Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.


Attribute-Based Access Control

Attribute-Based Access Control

Author: Vincent C. Hu

Publisher: Artech House

Published: 2017-10-31

Total Pages: 285

ISBN-13: 1630814962

DOWNLOAD EBOOK

This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges. Readers find authoritative insight into specialized topics including formal ABAC history, ABAC’s relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.


Modeling and Design of Secure Internet of Things

Modeling and Design of Secure Internet of Things

Author: Charles A. Kamhoua

Publisher: John Wiley & Sons

Published: 2020-06-05

Total Pages: 697

ISBN-13: 1119593379

DOWNLOAD EBOOK

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: Presents information on game-theory analysis of cyber deception Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation Contains contributions from an international panel of experts Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.


Security Basics for Computer Architects

Security Basics for Computer Architects

Author: Ruby B. Lee

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 96

ISBN-13: 3031017420

DOWNLOAD EBOOK

Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures.


Reinforcement Learning for Cyber-Physical Systems

Reinforcement Learning for Cyber-Physical Systems

Author: Chong Li

Publisher: CRC Press

Published: 2019-02-22

Total Pages: 249

ISBN-13: 1351006606

DOWNLOAD EBOOK

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.


Guide to Vulnerability Analysis for Computer Networks and Systems

Guide to Vulnerability Analysis for Computer Networks and Systems

Author: Simon Parkinson

Publisher: Springer

Published: 2018-09-04

Total Pages: 381

ISBN-13: 3319926241

DOWNLOAD EBOOK

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.


Advances in Information and Communication

Advances in Information and Communication

Author: Kohei Arai

Publisher: Springer Nature

Published: 2020-02-24

Total Pages: 927

ISBN-13: 303039445X

DOWNLOAD EBOOK

This book presents high-quality research on the concepts and developments in the field of information and communication technologies, and their applications. It features 134 rigorously selected papers (including 10 poster papers) from the Future of Information and Communication Conference 2020 (FICC 2020), held in San Francisco, USA, from March 5 to 6, 2020, addressing state-of-the-art intelligent methods and techniques for solving real-world problems along with a vision of future research Discussing various aspects of communication, data science, ambient intelligence, networking, computing, security and Internet of Things, the book offers researchers, scientists, industrial engineers and students valuable insights into the current research and next generation information science and communication technologies.