A Study of Black Hole Attack Solutions Book

A Study of Black Hole Attack Solutions


  • Author : Elahe Fazeldehkordi
  • Publisher : Syngress
  • Release Date : 2015-11-03
  • Genre: Computers
  • Pages : 124
  • ISBN 10 : 9780128053799

DOWNLOAD BOOK
A Study of Black Hole Attack Solutions Excerpt :

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks Book

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks


  • Author : Sagayam, K. Martin
  • Publisher : IGI Global
  • Release Date : 2020-06-12
  • Genre: Computers
  • Pages : 405
  • ISBN 10 : 9781799850694

DOWNLOAD BOOK
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks Excerpt :

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.

Advances in Computer Science and Ubiquitous Computing Book

Advances in Computer Science and Ubiquitous Computing


  • Author : James J. Park
  • Publisher : Springer Nature
  • Release Date : 2021-01-04
  • Genre: Technology & Engineering
  • Pages : 605
  • ISBN 10 : 9789811593437

DOWNLOAD BOOK
Advances in Computer Science and Ubiquitous Computing Excerpt :

This book presents the combined proceedings of the 11th International Conference on Computer Science and its Applications (CSA 2019) and the 14th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2019), both held in Macau, China, December 18–20, 2019. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science and other disciplines related to ubiquitous computing.

Smart and Innovative Trends in Next Generation Computing Technologies Book

Smart and Innovative Trends in Next Generation Computing Technologies


  • Author : Pushpak Bhattacharyya
  • Publisher : Springer
  • Release Date : 2018-06-08
  • Genre: Computers
  • Pages : 968
  • ISBN 10 : 9789811086601

DOWNLOAD BOOK
Smart and Innovative Trends in Next Generation Computing Technologies Excerpt :

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

Networking  Intelligent Systems and Security Book

Networking Intelligent Systems and Security


  • Author : Mohamed Ben Ahmed
  • Publisher : Springer Nature
  • Release Date : 2021-10-01
  • Genre: Technology & Engineering
  • Pages : 901
  • ISBN 10 : 9789811636370

DOWNLOAD BOOK
Networking Intelligent Systems and Security Excerpt :

This book gathers best selected research papers presented at the International Conference on Networking, Intelligent Systems and Security, held in Kenitra, Morocco, during 01–02 April 2021. The book highlights latest research and findings in the field of ICT, and it provides new solutions, efficient tools, and techniques that draw on modern technologies to increase urban services. In addition, it provides a critical overview of the status quo, shares new propositions, and outlines future perspectives in networks, smart systems, security, information technologies, and computer science.

Machine Learning for Computer and Cyber Security Book

Machine Learning for Computer and Cyber Security


  • Author : Brij B. Gupta
  • Publisher : CRC Press
  • Release Date : 2019-02-05
  • Genre: Computers
  • Pages : 333
  • ISBN 10 : 9780429995712

DOWNLOAD BOOK
Machine Learning for Computer and Cyber Security Excerpt :

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding

Cryptography  Breakthroughs in Research and Practice Book

Cryptography Breakthroughs in Research and Practice


  • Author : Management Association, Information Resources
  • Publisher : IGI Global
  • Release Date : 2019-12-06
  • Genre: Computers
  • Pages : 578
  • ISBN 10 : 9781799817642

DOWNLOAD BOOK
Cryptography Breakthroughs in Research and Practice Excerpt :

Advances in technology have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Innovative Security Solutions for Information Technology and Communications Book

Innovative Security Solutions for Information Technology and Communications


  • Author : Ion Bica
  • Publisher : Springer
  • Release Date : 2016-01-14
  • Genre: Computers
  • Pages : 281
  • ISBN 10 : 9783319271798

DOWNLOAD BOOK
Innovative Security Solutions for Information Technology and Communications Excerpt :

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics.

Emerging Trends in Intelligent Systems   Network Security Book

Emerging Trends in Intelligent Systems Network Security


  • Author : Mohamed Ben Ahmed
  • Publisher : Springer Nature
  • Release Date : 2022-08-31
  • Genre: Technology & Engineering
  • Pages : 549
  • ISBN 10 : 9783031151910

DOWNLOAD BOOK
Emerging Trends in Intelligent Systems Network Security Excerpt :

This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30–31, 2022, hosted in online mode in Bandung, Indonesia. Building on the successful history of the conference series in the recent four years, this book aims to present the paramount role of connecting researchers around the world to disseminate and share new ideas in intelligent information systems, cyber-security, and networking technologies. The 49 chapters presented in this book were carefully reviewed and selected from 115 submissions. They focus on delivering intelligent solutions through leveraging advanced information systems, networking, and security for competitive advantage and cost savings in modern industrial sectors as well as public, business, and education sectors. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

Information Processing and Management Book

Information Processing and Management


  • Author : Vinu V Das
  • Publisher : Springer Science & Business Media
  • Release Date : 2010-04-01
  • Genre: Computers
  • Pages : 693
  • ISBN 10 : 9783642122132

DOWNLOAD BOOK
Information Processing and Management Excerpt :

It is my pleasure to write the preface for Information Processing and Management. This book aims to bring together innovative results and new research trends in inf- mation processing, computer science and management engineering. If an information processing system is able to perform useful actions for an obj- tive in a given domain, it is because the system knows something about that domain. The more knowledge it has, the more useful it can be to its users. Without that kno- edge, the system itself is useless. In the information systems field, there is conceptual modeling for the activity that elicits and describes the general knowledge a particular information system needs to know. The main objective of conceptual modeling is to obtain that description, which is called a conceptual schema. Conceptual schemas are written in languages called conceptual modeling languages. Conceptual modeling is an important part of requi- ments engineering, the first and most important phase in the development of an inf- mation system.

Research Anthology on Machine Learning Techniques  Methods  and Applications Book

Research Anthology on Machine Learning Techniques Methods and Applications


  • Author : Management Association, Information Resources
  • Publisher : IGI Global
  • Release Date : 2022-05-13
  • Genre: Computers
  • Pages : 1516
  • ISBN 10 : 9781668462928

DOWNLOAD BOOK
Research Anthology on Machine Learning Techniques Methods and Applications Excerpt :

Machine learning continues to have myriad applications across industries and fields. To ensure this technology is utilized appropriately and to its full potential, organizations must better understand exactly how and where it can be adapted. Further study on the applications of machine learning is required to discover its best practices, challenges, and strategies. The Research Anthology on Machine Learning Techniques, Methods, and Applications provides a thorough consideration of the innovative and emerging research within the area of machine learning. The book discusses how the technology has been used in the past as well as potential ways it can be used in the future to ensure industries continue to develop and grow. Covering a range of topics such as artificial intelligence, deep learning, cybersecurity, and robotics, this major reference work is ideal for computer scientists, managers, researchers, scholars, practitioners, academicians, instructors, and students.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security Book
Score: 4.5
From 6 Ratings

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security


  • Author : Gupta, Brij
  • Publisher : IGI Global
  • Release Date : 2016-05-16
  • Genre: Computers
  • Pages : 589
  • ISBN 10 : 9781522501060

DOWNLOAD BOOK
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security Excerpt :

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Black Hole Attack in Manet Book

Black Hole Attack in Manet


  • Author : Deepak Sharma
  • Publisher : Educreation Publishing
  • Release Date : 2019-03-10
  • Genre: Education
  • Pages : 139
  • ISBN 10 : 978186723xxxx

DOWNLOAD BOOK
Black Hole Attack in Manet Excerpt :

Black hole attack is the famous security attack in which an intruder node come in a network and behaves as friend node to steal sensitive data. In this book a complete solution to the black hole problem is discussed and implemeted in network simulator -2. This book is targeted for all those who wants to work in MANET, BLACK HOLE, NETWORK SIMULATOR-2, COMPUTER NETWORKS and many more.

Issues in Networks Research and Application  2013 Edition Book

Issues in Networks Research and Application 2013 Edition


  • Author : Anonim
  • Publisher : ScholarlyEditions
  • Release Date : 2013-05-01
  • Genre: Computers
  • Pages : 1089
  • ISBN 10 : 9781490107738

DOWNLOAD BOOK
Issues in Networks Research and Application 2013 Edition Excerpt :

Issues in Networks Research and Application: 2013 Edition is a ScholarlyEditions™ book that delivers timely, authoritative, and comprehensive information about Communication Networks. The editors have built Issues in Networks Research and Application: 2013 Edition on the vast information databases of ScholarlyNews.™ You can expect the information about Communication Networks in this book to be deeper than what you can access anywhere else, as well as consistently reliable, authoritative, informed, and relevant. The content of Issues in Networks Research and Application: 2013 Edition has been produced by the world’s leading scientists, engineers, analysts, research institutions, and companies. All of the content is from peer-reviewed sources, and all of it is written, assembled, and edited by the editors at ScholarlyEditions™ and available exclusively from us. You now have a source you can cite with authority, confidence, and credibility. More information is available at http://www.ScholarlyEditions.com/.

Information Networking  Towards Ubiquitous Networking and Services Book

Information Networking Towards Ubiquitous Networking and Services


  • Author : Teresa Vazão
  • Publisher : Springer
  • Release Date : 2008-11-20
  • Genre: Computers
  • Pages : 843
  • ISBN 10 : 9783540895244

DOWNLOAD BOOK
Information Networking Towards Ubiquitous Networking and Services Excerpt :

This volume contains the set of revised selected papers presented at the 21st International Conference on Information Networking (ICOIN 2007), which was held in Estoril, Portugal, January 23–25, 2007. The conference series started under the name of Joint Workshop on Computer Communications, in 1986. At that time, it constituted a technical meeting for researchersand engineers on - ternet technologies in East Asian countries, where several technical networking issues were discussed. In 1993, the meeting was reorganized as an international conference known as ICOIN. Recent conferences were held in Sendai, Japan (2006),Jeju,Korea(2005),Pusan,Korea(2004),Jeju,Korea(2003),Jeju,Korea (2002), Beppu City, Japan (2001), Hsin-chu, Taiwan (2000), and Tokyo, Japan (1999). In 2007, for the ?rst time since its creation, ICOIN took place outside Asia, and we were very pleased to host it in Portugal. ICOIN 2007 was or- nized by INESC-ID and IST/Technical University of Lisbon (Portugal) with the technical co-sponsorship of IEEE Communications Society and IEEE Portugal Section-Computer Society Chapter, in cooperation with the Order of Engineers CollegeofInformaticsEngineering(Portugal),IPSJ(InformationProcessing- ciety of Japan), KISS (Korea Information Science Society), and Lecture Notes in Computer Science (LNCS), Springer, Germany. The papers presented in this volume were selected in two stages: 1) revi- ing and selection for the ICOIN program and 2) on-site presentation review by session chairs or by program committee chairs.