找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Handbook of Big Data and IoT Security; Ali Dehghantanha,Kim-Kwang Raymond Choo Book 2019 Springer Nature Switzerland AG 2019 big data secu

[复制链接]
查看: 48588|回复: 54
发表于 2025-3-21 17:48:15 | 显示全部楼层 |阅读模式
书目名称Handbook of Big Data and IoT Security
编辑Ali Dehghantanha,Kim-Kwang Raymond Choo
视频videohttp://file.papertrans.cn/421/420875/420875.mp4
概述Provides a unique and interdisciplinary view to security challenge in both IoT and Big Data platforms.Covers all aspects of system defense from attack detection to prevention and analysis.Offers foren
图书封面Titlebook: Handbook of Big Data and IoT Security;  Ali Dehghantanha,Kim-Kwang Raymond Choo Book 2019 Springer Nature Switzerland AG 2019 big data secu
描述.This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it  explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service.. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera‘s sensor pattern noise from the captured image.. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, Pro
出版日期Book 2019
关键词big data security; IoT security; cyber threat intelligence; cyber threat hunting; cyber security; digital
版次1
doihttps://doi.org/10.1007/978-3-030-10543-3
isbn_ebook978-3-030-10543-3
copyrightSpringer Nature Switzerland AG 2019
The information of publication is updating

书目名称Handbook of Big Data and IoT Security影响因子(影响力)




书目名称Handbook of Big Data and IoT Security影响因子(影响力)学科排名




书目名称Handbook of Big Data and IoT Security网络公开度




书目名称Handbook of Big Data and IoT Security网络公开度学科排名




书目名称Handbook of Big Data and IoT Security被引频次




书目名称Handbook of Big Data and IoT Security被引频次学科排名




书目名称Handbook of Big Data and IoT Security年度引用




书目名称Handbook of Big Data and IoT Security年度引用学科排名




书目名称Handbook of Big Data and IoT Security读者反馈




书目名称Handbook of Big Data and IoT Security读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:24:00 | 显示全部楼层
Towards Indeterminacy-Tolerant Access Control in IoT,access control models, even those that introduce some form of resiliency into the access decision process, cannot make a correct access decision in unpredicted scenarios, which are typically found in IoT due to its inherent characteristics that amplify indeterminacy. Therefore, this work stresses th
发表于 2025-3-22 02:49:02 | 显示全部楼层
Distributed Filesystem Forensics: Ceph as a Case Study, become a priority in Ceph file system. In this paper, we are presenting residual evidences of users’ activities on Ceph file system on Linux Ubuntu 12.4 operating system and discuss the forensics relevance and importance of detected evidences. This research follows a well-known cloud forensics fram
发表于 2025-3-22 05:35:22 | 显示全部楼层
发表于 2025-3-22 10:54:57 | 显示全部楼层
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications,puts used during the test and how these samples were collected or created. In this paper, we introduce a technique to leverage from the different crashes discovered from two fuzzing approaches to improve fuzzers by concentrating on utilised test cases. The code coverage is used as an efficiency metr
发表于 2025-3-22 14:36:55 | 显示全部楼层
Therapy and Emotions in Film and Televisionaccess control models, even those that introduce some form of resiliency into the access decision process, cannot make a correct access decision in unpredicted scenarios, which are typically found in IoT due to its inherent characteristics that amplify indeterminacy. Therefore, this work stresses th
发表于 2025-3-22 17:30:21 | 显示全部楼层
Infectious Diseases: Bacterial Infections, become a priority in Ceph file system. In this paper, we are presenting residual evidences of users’ activities on Ceph file system on Linux Ubuntu 12.4 operating system and discuss the forensics relevance and importance of detected evidences. This research follows a well-known cloud forensics fram
发表于 2025-3-22 22:17:52 | 显示全部楼层
发表于 2025-3-23 04:25:18 | 显示全部楼层
Scott F. M. Duncan,Christopher W. Flowersputs used during the test and how these samples were collected or created. In this paper, we introduce a technique to leverage from the different crashes discovered from two fuzzing approaches to improve fuzzers by concentrating on utilised test cases. The code coverage is used as an efficiency metr
发表于 2025-3-23 06:15:40 | 显示全部楼层
Book 2019tern noise from the captured image.. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, Pro
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-5 05:21
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表