Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

Author: Joaquin Garcia-Alfaro

Publisher: Springer Nature

Published: 2021-11-02

Total Pages: 547

ISBN-13: 3030900193

DOWNLOAD EBOOK

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.


Intelligent Mobile Malware Detection

Intelligent Mobile Malware Detection

Author: Tony Thomas

Publisher: CRC Press

Published: 2022-12-30

Total Pages: 189

ISBN-13: 1000824985

DOWNLOAD EBOOK

The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, and the malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware.


Handbook of Research on Cloud Computing and Big Data Applications in IoT

Handbook of Research on Cloud Computing and Big Data Applications in IoT

Author: Gupta, B. B.

Publisher: IGI Global

Published: 2019-04-12

Total Pages: 637

ISBN-13: 1522584080

DOWNLOAD EBOOK

Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information and communication technology but also all types of systems in society including within the realms of business, finance, industry, manufacturing, and management. Therefore, it is critical to remain up-to-date on the latest advancements and applications, as well as current issues and challenges. The Handbook of Research on Cloud Computing and Big Data Applications in IoT is a pivotal reference source that provides relevant theoretical frameworks and the latest empirical research findings on principles, challenges, and applications of cloud computing, big data, and IoT. While highlighting topics such as fog computing, language interaction, and scheduling algorithms, this publication is ideally designed for software developers, computer engineers, scientists, professionals, academicians, researchers, and students.


Computer Security – ESORICS 2017

Computer Security – ESORICS 2017

Author: Simon N. Foley

Publisher: Springer

Published: 2017-09-01

Total Pages: 573

ISBN-13: 3319663992

DOWNLOAD EBOOK

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.


Security in Computing and Communications

Security in Computing and Communications

Author: Sabu M. Thampi

Publisher: Springer Nature

Published: 2021-02-09

Total Pages: 314

ISBN-13: 9811604223

DOWNLOAD EBOOK

This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.


Edge Analytics

Edge Analytics

Author: Ripon Patgiri

Publisher: Springer Nature

Published: 2022-04-03

Total Pages: 720

ISBN-13: 9811900191

DOWNLOAD EBOOK

This book constitutes refereed proceedings of the 26th annual International Conference on Advanced Computing and Communications (ADCOM 2020). ADCOM, the flagship Systems Conference of the ACCS, is a major annual international meeting that draws leading scientists and researchers in computational and communications engineering from across industry and academia. The proceedings highlight the growing importance of large-scale systems engineering and discuss leading-edge research and trends. The main theme of ADCOM 2020 is Edge Analytics. The book includes novel contributions and latest developments from researchers across industry and academia who are working in security, privacy, and data analytics from both technological and social perspectives. The book serves as a valuable reference resource for academics and researchers across the globe.