Advancements in Cybersecurity
Next-Generation Systems and Applications
Herausgeber: Imoize, Agbotiname Lucky; Yeremenko, Oleksandra; Lemeshko, Oleksandr; Kuznetsov, Oleksandr
Advancements in Cybersecurity
Next-Generation Systems and Applications
Herausgeber: Imoize, Agbotiname Lucky; Yeremenko, Oleksandra; Lemeshko, Oleksandr; Kuznetsov, Oleksandr
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, information security technologies, and beyond.
Andere Kunden interessierten sich auch für
- Theoretical and Practical Advancements for Fuzzy System Integration209,99 €
- Shiu-Kai ChinAccess Control, Security, and Trust153,99 €
- Rosenberg, Burton. Reihe herausgegeben von Stinson, Douglas R.Handbook of Financial Cryptography and Security222,99 €
- Douglas JacobsonIntroduction to Network Security137,99 €
- Franjieh El KhouryIris Biometric Model for Secured Network Access218,99 €
- Richard R BrooksIntroduction to Computer and Network Security121,99 €
- Debdeep MukhopadhyayHardware Security186,99 €
-
-
-
This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, information security technologies, and beyond.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 592
- Erscheinungstermin: 7. Juli 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032900995
- ISBN-10: 1032900997
- Artikelnr.: 72654736
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 592
- Erscheinungstermin: 7. Juli 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032900995
- ISBN-10: 1032900997
- Artikelnr.: 72654736
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Agbotiname Lucky Imoize is a Lecturer in the Department of Electrical and Electronics Engineering at the University of Lagos, Nigeria. His research interests include 6G wireless communication, wireless security systems, and artificial intelligence. He is a Fulbright research fellow, the vice chair of the IEEE Communication Society Nigeria chapter, a registered engineer with the Council for the Regulation of Engineering in Nigeria, and a senior member of IEEE. Oleksandr Kuznetsov is a professor at the Department of Theoretical and Applied Sciences, eCampus University, Italy, and a professor in the Department of Security Information Systems and Technologies at V. N. Karazin Kharkiv National University, Ukraine. A recognized expert in computer science, his research encompasses information and cybersecurity, applied cryptography, information and coding theory, and the modeling of complex technical systems. He has co-authored several national cryptographic standards for Ukraine. Oleksandr Lemeshko is a Professor and Head of the V.V. Popovskyy Department of Infocommunication Engineering at Kharkiv National University of Radio Electronics, Ukraine. His research interests include cyber-resilient networks, incident response, network security, fault-tolerant networks, and Software-Defined Networks. He was a local researcher on a project funded by the National Research Foundation of Ukraine. He participates in the German-Ukrainian project, "DigiJED-2/3: Digital Education with Joined Efforts." He is the Chief Editor of the electronic journal Problems of Telecommunications and a senior member of IEEE. Oleksandra Yeremenko is a Professor in the V.V. Popovskyy Department of Infocommunication Engineering at Kharkiv National University of Radio Electronics, Ukraine. Her research interests include cyber-resilience, communication network resilience, Future Networks, and Software-Defined Networks. She was the Vice Chair of the IEEE Young Professionals Ukraine Section Affinity Group and the IEEE Women in Engineering Ukraine Section Affinity Group. She is also a senior IEEE member and the Kharkiv Information & Communication Technologies ACM-W Chapter Chair.
Chapter 1- A Novel Hybrid Method for Randomness Extraction
Chapter 2- Blockchain technology as the new defense of information systems
and networks in cyber-spheres
Chapter 3- Innovative Cost Functions for Optimizing Cryptographic S-Box
Generation
Chapter 4- Enhanced Cryptographic Security through Advanced S-box
Optimization: A Hybrid Heuristic Approach
Chapter 5- Enhancing Cryptographic Strength: A Novel Approach to S-Box
Generation Using Modified Simulated Annealing
Chapter 6- Factorial Representation of S-boxes: A Novel Approach to
Cryptographic Analysis and Optimization
Chapter 7- Optimized Simulated Annealing for Efficient Generation of Highly
Nonlinear S-Boxes
Chapter 8- Analysis of Security Mechanisms of New Generation Cellular
Networks
Chapter 9- Deep Learning Frontiers in Copy-Move Forgery Detection:
Advances, Challenges, and Future Directions
Chapter 10- Deep Learning Model for Detecting Copy-Move Attack in Images:
Testing and Verification
Chapter 11- System of Routing Solutions Based on Security-Aware Traffic
Engineering Models
Chapter 12- Information Technology Security Platform for
Intellectualization
Chapter 13- Robust Model and Training Method For Malware Recognition In IoT
Devices
Chapter 14- Detection of network attacks based on the Red Hunt virtual
machine
Chapter 15- Secure 5G Network for Monitoring State of Critical
Infrastructure Facilities
Chapter 16- Cybersecurity and Resilience in the Data Centers Design in War
Time
Chapter 17- Indexing the State of Military Cyber Defence and Hacktivism in
Wartime in Ukraine
Chapter 18- Fast Quantification Methods for Reconfigurable Cybersecurity
Systems Using Multi-Pattern Matching
Chapter 19- Research and Development of Normalized Link Blocking Models in
Secure Traffic Engineering Routing for Programmable Networks
Chapter 20- AI-Driven Content Optimization and Generation with Integrated
Digital Forensics for Authentic and Secure Media
Chapter 21- Visible Light Communication Enabling Next-Generation Wireless
Networks
Chapter 22- Leveraging the Integrated Decision Model for the Emerging
Market of Visible Light Communication
Chapter 23- Advancing Cyber Defense with Artificial Intelligence:
State-of-the-Art Techniques and Future Directions
Chapter 2- Blockchain technology as the new defense of information systems
and networks in cyber-spheres
Chapter 3- Innovative Cost Functions for Optimizing Cryptographic S-Box
Generation
Chapter 4- Enhanced Cryptographic Security through Advanced S-box
Optimization: A Hybrid Heuristic Approach
Chapter 5- Enhancing Cryptographic Strength: A Novel Approach to S-Box
Generation Using Modified Simulated Annealing
Chapter 6- Factorial Representation of S-boxes: A Novel Approach to
Cryptographic Analysis and Optimization
Chapter 7- Optimized Simulated Annealing for Efficient Generation of Highly
Nonlinear S-Boxes
Chapter 8- Analysis of Security Mechanisms of New Generation Cellular
Networks
Chapter 9- Deep Learning Frontiers in Copy-Move Forgery Detection:
Advances, Challenges, and Future Directions
Chapter 10- Deep Learning Model for Detecting Copy-Move Attack in Images:
Testing and Verification
Chapter 11- System of Routing Solutions Based on Security-Aware Traffic
Engineering Models
Chapter 12- Information Technology Security Platform for
Intellectualization
Chapter 13- Robust Model and Training Method For Malware Recognition In IoT
Devices
Chapter 14- Detection of network attacks based on the Red Hunt virtual
machine
Chapter 15- Secure 5G Network for Monitoring State of Critical
Infrastructure Facilities
Chapter 16- Cybersecurity and Resilience in the Data Centers Design in War
Time
Chapter 17- Indexing the State of Military Cyber Defence and Hacktivism in
Wartime in Ukraine
Chapter 18- Fast Quantification Methods for Reconfigurable Cybersecurity
Systems Using Multi-Pattern Matching
Chapter 19- Research and Development of Normalized Link Blocking Models in
Secure Traffic Engineering Routing for Programmable Networks
Chapter 20- AI-Driven Content Optimization and Generation with Integrated
Digital Forensics for Authentic and Secure Media
Chapter 21- Visible Light Communication Enabling Next-Generation Wireless
Networks
Chapter 22- Leveraging the Integrated Decision Model for the Emerging
Market of Visible Light Communication
Chapter 23- Advancing Cyber Defense with Artificial Intelligence:
State-of-the-Art Techniques and Future Directions
Chapter 1- A Novel Hybrid Method for Randomness Extraction
Chapter 2- Blockchain technology as the new defense of information systems
and networks in cyber-spheres
Chapter 3- Innovative Cost Functions for Optimizing Cryptographic S-Box
Generation
Chapter 4- Enhanced Cryptographic Security through Advanced S-box
Optimization: A Hybrid Heuristic Approach
Chapter 5- Enhancing Cryptographic Strength: A Novel Approach to S-Box
Generation Using Modified Simulated Annealing
Chapter 6- Factorial Representation of S-boxes: A Novel Approach to
Cryptographic Analysis and Optimization
Chapter 7- Optimized Simulated Annealing for Efficient Generation of Highly
Nonlinear S-Boxes
Chapter 8- Analysis of Security Mechanisms of New Generation Cellular
Networks
Chapter 9- Deep Learning Frontiers in Copy-Move Forgery Detection:
Advances, Challenges, and Future Directions
Chapter 10- Deep Learning Model for Detecting Copy-Move Attack in Images:
Testing and Verification
Chapter 11- System of Routing Solutions Based on Security-Aware Traffic
Engineering Models
Chapter 12- Information Technology Security Platform for
Intellectualization
Chapter 13- Robust Model and Training Method For Malware Recognition In IoT
Devices
Chapter 14- Detection of network attacks based on the Red Hunt virtual
machine
Chapter 15- Secure 5G Network for Monitoring State of Critical
Infrastructure Facilities
Chapter 16- Cybersecurity and Resilience in the Data Centers Design in War
Time
Chapter 17- Indexing the State of Military Cyber Defence and Hacktivism in
Wartime in Ukraine
Chapter 18- Fast Quantification Methods for Reconfigurable Cybersecurity
Systems Using Multi-Pattern Matching
Chapter 19- Research and Development of Normalized Link Blocking Models in
Secure Traffic Engineering Routing for Programmable Networks
Chapter 20- AI-Driven Content Optimization and Generation with Integrated
Digital Forensics for Authentic and Secure Media
Chapter 21- Visible Light Communication Enabling Next-Generation Wireless
Networks
Chapter 22- Leveraging the Integrated Decision Model for the Emerging
Market of Visible Light Communication
Chapter 23- Advancing Cyber Defense with Artificial Intelligence:
State-of-the-Art Techniques and Future Directions
Chapter 2- Blockchain technology as the new defense of information systems
and networks in cyber-spheres
Chapter 3- Innovative Cost Functions for Optimizing Cryptographic S-Box
Generation
Chapter 4- Enhanced Cryptographic Security through Advanced S-box
Optimization: A Hybrid Heuristic Approach
Chapter 5- Enhancing Cryptographic Strength: A Novel Approach to S-Box
Generation Using Modified Simulated Annealing
Chapter 6- Factorial Representation of S-boxes: A Novel Approach to
Cryptographic Analysis and Optimization
Chapter 7- Optimized Simulated Annealing for Efficient Generation of Highly
Nonlinear S-Boxes
Chapter 8- Analysis of Security Mechanisms of New Generation Cellular
Networks
Chapter 9- Deep Learning Frontiers in Copy-Move Forgery Detection:
Advances, Challenges, and Future Directions
Chapter 10- Deep Learning Model for Detecting Copy-Move Attack in Images:
Testing and Verification
Chapter 11- System of Routing Solutions Based on Security-Aware Traffic
Engineering Models
Chapter 12- Information Technology Security Platform for
Intellectualization
Chapter 13- Robust Model and Training Method For Malware Recognition In IoT
Devices
Chapter 14- Detection of network attacks based on the Red Hunt virtual
machine
Chapter 15- Secure 5G Network for Monitoring State of Critical
Infrastructure Facilities
Chapter 16- Cybersecurity and Resilience in the Data Centers Design in War
Time
Chapter 17- Indexing the State of Military Cyber Defence and Hacktivism in
Wartime in Ukraine
Chapter 18- Fast Quantification Methods for Reconfigurable Cybersecurity
Systems Using Multi-Pattern Matching
Chapter 19- Research and Development of Normalized Link Blocking Models in
Secure Traffic Engineering Routing for Programmable Networks
Chapter 20- AI-Driven Content Optimization and Generation with Integrated
Digital Forensics for Authentic and Secure Media
Chapter 21- Visible Light Communication Enabling Next-Generation Wireless
Networks
Chapter 22- Leveraging the Integrated Decision Model for the Emerging
Market of Visible Light Communication
Chapter 23- Advancing Cyber Defense with Artificial Intelligence:
State-of-the-Art Techniques and Future Directions