Cyber security for next-generation computing technologies:
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2024
|
Ausgabe: | First edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations |
Beschreibung: | xiv, 313 Seiten Illustrationen, Diagramme |
ISBN: | 9781032518992 9781032519005 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049625876 | ||
003 | DE-604 | ||
005 | 20250121 | ||
007 | t| | ||
008 | 240325s2024 xx a||| |||| 00||| eng d | ||
020 | |a 9781032518992 |c Hbk. |9 978-1-032-51899-2 | ||
020 | |a 9781032519005 |c Pbk. |9 978-1-032-51900-5 | ||
035 | |a (OCoLC)1430766924 | ||
035 | |a (DE-599)BVBBV049625876 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-188 |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Cyber security for next-generation computing technologies |c edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz |
250 | |a First edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2024 | |
300 | |a xiv, 313 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Lernen |0 (DE-588)4193754-5 |2 gnd |9 rswk-swf |
653 | 0 | |a Artificial intelligence | |
653 | 0 | |a COM093000 | |
653 | 0 | |a COM095000 | |
653 | 0 | |a COMPUTERS / Artificial Intelligence | |
653 | 0 | |a COMPUTERS / Cryptography | |
653 | 0 | |a COMPUTERS / Data Transmission Systems / Electronic Data Interchange | |
653 | 0 | |a COMPUTERS / Information Technology | |
653 | 0 | |a COMPUTERS / Internet / Security | |
653 | 0 | |a COMPUTERS / Networking / Security | |
653 | 0 | |a COMPUTERS / Security / General | |
653 | 0 | |a COMPUTERS / Security / Viruses | |
653 | 0 | |a COMPUTERS / Social Aspects / Human-Computer Interaction | |
653 | 0 | |a Computer architecture & logic design | |
653 | 0 | |a Computer fraud & hacking | |
653 | 0 | |a Computer networking & communications | |
653 | 0 | |a Computerkriminalität, Hacking | |
653 | 0 | |a Computernetzwerke und maschinelle Kommunikation | |
653 | 0 | |a Datenschutz | |
653 | 0 | |a Dienstleistungsgewerbe, Gastgewerbe | |
653 | 0 | |a Digital- und Informationstechnologien: Rechtliche Aspekte | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Maschinelles Lernen |0 (DE-588)4193754-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Khan, Inam Ullah |0 (DE-588)1272976076 |4 edt | |
700 | 1 | |a Ouaissa, Mariya |0 (DE-588)1272975355 |4 edt | |
700 | 1 | |a Ouaissa, Mariyam |0 (DE-588)1259340570 |4 edt | |
700 | 1 | |a Abou El Houda, Zakaria |0 (DE-588)1326328328 |4 edt | |
700 | 1 | |a Ijaz, Muhammad Fazal |0 (DE-588)1326328921 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o 10.1201/9781003404361 |z 978-1-003-40436-1 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034969812&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034969812 |
Datensatz im Suchindex
_version_ | 1822399693711212544 |
---|---|
adam_text |
Contents Preface. vii About the Editors. ix List of Contributors.xiii Chapter 1 Cyber Security: Future Trends and Solutions. 1 Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar Chapter 2 Security and Intelligent Management: Survey. 16 Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, and Muhammad Allah Rakha Chapter 3 Comparative Analysis of Machine and Deep Learning for Cyber Security. 39 Hafsa Maryam, Syeda Zillay Nain Zukhraf, and Rehmat Ullah Chapter 4 AI-Based Secure Wireless Communication Technologies and Cyber Threats for loT Networks. 70 Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, and Salma El Hajjami Chapter 5 Cyber Threat Actors Review: Examining the Tactics and Motivations of Adversaries in the Cyber Landscape.84 Zakaria Abou El Houda Chapter 6 Layer-Based Security Threats in loT Networks. 102 Muna Muhammad, Ahthasham Sajid, and Hira Arshad Chapter 7 Intrusion Detection System Using AI and Machine Learning Algorithm. 120 Muhammad Tehmasib AU Tashfeen Chapter 8 Signature-Based Intrusion Detection System for
loT.141 Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, and Muhammad Fayaz V
Contents νΐ Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the MQTT-IoT-IDS2020 Dataset. 159 Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, and Muhammad Yaseen Ayub Chapter 10 Cyber Security for Edge/Fog Computing Applications. 177 Hanane Lamaazi Chapter 11 Cyber Attacks Against Intelligent Transportation Systems. 190 Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid Chapter 12 Intelligent Transportation Systems for IoT-Based UAV Networks. 231 Mamoona Jamil, Usman Haider, Inam Ullah Khan, and Tarandeep Kaur Bhatia Chapter 13 Cyber Attack Detection Analysis Using Machine Learning for IoT-Based UAV Network. 253 Usman Haider, Hina Shoukat, Muhammad Yaseen Ayub, Muhammad Tehmasib AU Tashfeen, Tarandeep Kaur Bhatia, and Inam Ullah Khan Chapter 14 Blockchain Solutions for Cyber Criminals. 265 Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, and Bhupendra Kumar Soni Chapter 15 Blockchain Security Measures to Combat Cyber Crime. 275 Rahmeh Ibrahim and Qasem Abu Al-Haija Chapter 16 AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective.294 Fahad Naveed, Shahbaz AU Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman Khan, and Inam Ullah Khan |
adam_txt | |
any_adam_object | 1 |
any_adam_object_boolean | |
author2 | Khan, Inam Ullah Ouaissa, Mariya Ouaissa, Mariyam Abou El Houda, Zakaria Ijaz, Muhammad Fazal |
author2_role | edt edt edt edt edt |
author2_variant | i u k iu iuk m o mo m o mo e h z a ehz ehza m f i mf mfi |
author_GND | (DE-588)1272976076 (DE-588)1272975355 (DE-588)1259340570 (DE-588)1326328328 (DE-588)1326328921 |
author_facet | Khan, Inam Ullah Ouaissa, Mariya Ouaissa, Mariyam Abou El Houda, Zakaria Ijaz, Muhammad Fazal |
building | Verbundindex |
bvnumber | BV049625876 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1430766924 (DE-599)BVBBV049625876 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049625876</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250121</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">240325s2024 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032518992</subfield><subfield code="c">Hbk.</subfield><subfield code="9">978-1-032-51899-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032519005</subfield><subfield code="c">Pbk.</subfield><subfield code="9">978-1-032-51900-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430766924</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049625876</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security for next-generation computing technologies</subfield><subfield code="c">edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 313 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Lernen</subfield><subfield code="0">(DE-588)4193754-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COM093000</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COM095000</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Artificial Intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Data Transmission Systems / Electronic Data Interchange</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Information Technology</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Internet / Security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / Viruses</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Social Aspects / Human-Computer Interaction</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer architecture & logic design</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer fraud & hacking</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networking & communications</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computerkriminalität, Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computernetzwerke und maschinelle Kommunikation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Datenschutz</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Dienstleistungsgewerbe, Gastgewerbe</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Digital- und Informationstechnologien: Rechtliche Aspekte</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Maschinelles Lernen</subfield><subfield code="0">(DE-588)4193754-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Inam Ullah</subfield><subfield code="0">(DE-588)1272976076</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ouaissa, Mariya</subfield><subfield code="0">(DE-588)1272975355</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ouaissa, Mariyam</subfield><subfield code="0">(DE-588)1259340570</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abou El Houda, Zakaria</subfield><subfield code="0">(DE-588)1326328328</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ijaz, Muhammad Fazal</subfield><subfield code="0">(DE-588)1326328921</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">10.1201/9781003404361</subfield><subfield code="z">978-1-003-40436-1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034969812&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034969812</subfield></datafield></record></collection> |
id | DE-604.BV049625876 |
illustrated | Illustrated |
index_date | 2024-07-03T23:37:44Z |
indexdate | 2025-01-27T11:02:59Z |
institution | BVB |
isbn | 9781032518992 9781032519005 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034969812 |
oclc_num | 1430766924 |
open_access_boolean | |
owner | DE-188 DE-739 |
owner_facet | DE-188 DE-739 |
physical | xiv, 313 Seiten Illustrationen, Diagramme |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press |
record_format | marc |
spelling | Cyber security for next-generation computing technologies edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz First edition Boca Raton ; London ; New York CRC Press 2024 xiv, 313 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations Computersicherheit (DE-588)4274324-2 gnd rswk-swf Maschinelles Lernen (DE-588)4193754-5 gnd rswk-swf Artificial intelligence COM093000 COM095000 COMPUTERS / Artificial Intelligence COMPUTERS / Cryptography COMPUTERS / Data Transmission Systems / Electronic Data Interchange COMPUTERS / Information Technology COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General COMPUTERS / Security / Viruses COMPUTERS / Social Aspects / Human-Computer Interaction Computer architecture & logic design Computer fraud & hacking Computer networking & communications Computerkriminalität, Hacking Computernetzwerke und maschinelle Kommunikation Datenschutz Dienstleistungsgewerbe, Gastgewerbe Digital- und Informationstechnologien: Rechtliche Aspekte Computersicherheit (DE-588)4274324-2 s Maschinelles Lernen (DE-588)4193754-5 s DE-604 Khan, Inam Ullah (DE-588)1272976076 edt Ouaissa, Mariya (DE-588)1272975355 edt Ouaissa, Mariyam (DE-588)1259340570 edt Abou El Houda, Zakaria (DE-588)1326328328 edt Ijaz, Muhammad Fazal (DE-588)1326328921 edt Erscheint auch als Online-Ausgabe 10.1201/9781003404361 978-1-003-40436-1 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034969812&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cyber security for next-generation computing technologies Computersicherheit (DE-588)4274324-2 gnd Maschinelles Lernen (DE-588)4193754-5 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4193754-5 |
title | Cyber security for next-generation computing technologies |
title_auth | Cyber security for next-generation computing technologies |
title_exact_search | Cyber security for next-generation computing technologies |
title_exact_search_txtP | Cyber security for next-generation computing technologies |
title_full | Cyber security for next-generation computing technologies edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz |
title_fullStr | Cyber security for next-generation computing technologies edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz |
title_full_unstemmed | Cyber security for next-generation computing technologies edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz |
title_short | Cyber security for next-generation computing technologies |
title_sort | cyber security for next generation computing technologies |
topic | Computersicherheit (DE-588)4274324-2 gnd Maschinelles Lernen (DE-588)4193754-5 gnd |
topic_facet | Computersicherheit Maschinelles Lernen |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034969812&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT khaninamullah cybersecurityfornextgenerationcomputingtechnologies AT ouaissamariya cybersecurityfornextgenerationcomputingtechnologies AT ouaissamariyam cybersecurityfornextgenerationcomputingtechnologies AT abouelhoudazakaria cybersecurityfornextgenerationcomputingtechnologies AT ijazmuhammadfazal cybersecurityfornextgenerationcomputingtechnologies |