Securing the Digital Realm
Securing the Digital Realm
Advances in Hardware and Software Security, Communication, and Forensics
Geman, Oana; Abbasi, Waseem; Arif, Muhammad; Jaffar, M. Arfan
Taylor & Francis Ltd
03/2025
280
Dura
Inglês
9781032802305
15 a 20 dias
Descrição não disponível.
About the Editors. List of Contributors. 1.Performance analysis of PSK based advanced modulation formats for free space optical communication system. 2.Volatile Kernel Rootkit Hidden Process Detection View (VKRHPDV) Approach for Detection of Malware in Cloud Computing Environments. 3.Privacy preserved Federated Learning with Optimized Differential Privacy (FL-ODP). 4.Cyber Physical Systems having Nodes/Layers with Trustworthy Data: A Review. 5.Analysis of Device-To-Device Communication in IOT System. 6.Design and Implementation of an On-board System for a Spider Robot. 7.Revolutionizing Underwater Sensor Networks: A Novel Routing Approach for Efficient Data Collection with Atom-inspired Design. 8.Extending WSN Lifetime with Cluster Head Election. 9.A Parametric Analysis of Routing Protocols in Wireless Sensor Networks. 10.Implementation of IoT and WSN Technologies for Health Monitoring. 11.A Survey on Approximate Hardware Accelerator for Error-Tolerant Applications. 12.Virtual Memory Management Techniques. 13.A Comprehensive Survey on Software Defined Networking (SDN) Security. 14.Access Control Techniques for Cloud Computing: Review and Recommendations. 15.A Jurisprudence for Pakistan's Digital Forensic Investigation Framework Regarding Cybersecurity. 16.LockPath: Logic Locking Technique based on Longest Path Constraint for Hardware Security. 17.A Review of the Various Methods of Communication Used in Ad Hoc Networks. 18.Authentication of User Data for enhancing privacy in Cloud Computing Using Security Algorithms. 19.Big Data Issues in Mobile Cloud Computing. 20.A Comprehensive Review on the Role of Blockchain in Reinforcing Security for Industrial IoT. 21.Design & Implementation Role of Middleware in Shared Network Environments: A Systematic Review. 22.Challenges & Frameworks in Cloud Security Governance: A Review. 23.LTE/Wi-Fi Coexistence in Unlicensed Band. 24.Evolution of Next-Generation Firewall System for Secure Networks. 25.Security and Performance Comparison of Window and Linux - A Systematic Literature Review.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Redes de computadores e comunicações
- Privacidade e protecção de dados
- Engenharia do software
- Aspectos jurídicos da Tecnologia Informática
- Indústrias de serviços
- Criminologia: aspectos jurídicos
- Ciência forense
- Fraudes com computadores e hacking
- Arquitectura do computador e projecto lógico
- Causas e prevenção do crime
hardware security;software security;cybersecurity;digital forensics
About the Editors. List of Contributors. 1.Performance analysis of PSK based advanced modulation formats for free space optical communication system. 2.Volatile Kernel Rootkit Hidden Process Detection View (VKRHPDV) Approach for Detection of Malware in Cloud Computing Environments. 3.Privacy preserved Federated Learning with Optimized Differential Privacy (FL-ODP). 4.Cyber Physical Systems having Nodes/Layers with Trustworthy Data: A Review. 5.Analysis of Device-To-Device Communication in IOT System. 6.Design and Implementation of an On-board System for a Spider Robot. 7.Revolutionizing Underwater Sensor Networks: A Novel Routing Approach for Efficient Data Collection with Atom-inspired Design. 8.Extending WSN Lifetime with Cluster Head Election. 9.A Parametric Analysis of Routing Protocols in Wireless Sensor Networks. 10.Implementation of IoT and WSN Technologies for Health Monitoring. 11.A Survey on Approximate Hardware Accelerator for Error-Tolerant Applications. 12.Virtual Memory Management Techniques. 13.A Comprehensive Survey on Software Defined Networking (SDN) Security. 14.Access Control Techniques for Cloud Computing: Review and Recommendations. 15.A Jurisprudence for Pakistan's Digital Forensic Investigation Framework Regarding Cybersecurity. 16.LockPath: Logic Locking Technique based on Longest Path Constraint for Hardware Security. 17.A Review of the Various Methods of Communication Used in Ad Hoc Networks. 18.Authentication of User Data for enhancing privacy in Cloud Computing Using Security Algorithms. 19.Big Data Issues in Mobile Cloud Computing. 20.A Comprehensive Review on the Role of Blockchain in Reinforcing Security for Industrial IoT. 21.Design & Implementation Role of Middleware in Shared Network Environments: A Systematic Review. 22.Challenges & Frameworks in Cloud Security Governance: A Review. 23.LTE/Wi-Fi Coexistence in Unlicensed Band. 24.Evolution of Next-Generation Firewall System for Secure Networks. 25.Security and Performance Comparison of Window and Linux - A Systematic Literature Review.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Redes de computadores e comunicações
- Privacidade e protecção de dados
- Engenharia do software
- Aspectos jurídicos da Tecnologia Informática
- Indústrias de serviços
- Criminologia: aspectos jurídicos
- Ciência forense
- Fraudes com computadores e hacking
- Arquitectura do computador e projecto lógico
- Causas e prevenção do crime