Security Analytics A Data Centric Approach to Information Security 1st edition by Mehak Khurana – Ebook PDF Instant Download/DeliveryISBN: 1000597563, 9781000597561
Full download Security Analytics A Data Centric Approach to Information Security 1st edition after payment.
Product details:
ISBN-10 : 1000597563
ISBN-13 : 9781000597561
Author : Mehak Khurana
The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.
Security Analytics A Data Centric Approach to Information Security 1st Table of contents:
1 A Reliable Blockchain Application for Music in a Decentralized Network
1.1 Introduction
1.1.1 Need of Change in Music Industry
1.1.2 Challenges Faced by the Music Industry
1.2 Introduction to Blockchain
1.3 Blockchain Technologies
1.3.1 Smart Contracts
1.3.2 Ethereum
1.4 Framework for Royalty Distribution Using Blockchain
1.5 Implementation and Results
1.6 Future Research Prospects
1.6.1 Universal Music Database
1.6.2 Digital Content Distribution and Licensing
1.6.3 Affordable Music Sampling
1.7 Drawbacks
1.8 Conclusion
References
2 An Authentic Data-Centric Application for Medical Stores
2.1 Introduction
2.1.1 Purpose
2.1.2 Intended Audience
2.1.3 Product Scope
2.1.4 Tech Stack Description
2.1.5 Existing System
2.2 Literature Survey
2.3 Proposed Methodology for a Data-Centric Approach in Medical Stores
2.3.1 Implementation of Intelligent Pharmacy Application
2.3.2 Results and Discussion
2.4 Conclusion
References
3 Intelligent Data-Analytic Approach for Restaurant Recommendation
3.1 Introduction to Machine Learning
3.2 Related Work
3.2.1 Exploring Venue Popularity
3.2.2 Software Fault Prediction
3.2.3 Temperature and Humidity Data Analysis
3.2.4 Educational Data Mining for Prediction of Student Performance
3.2.5 Crime Prediction and Forecasting
3.2.6 Ship Trajectory Prediction
3.2.7 Incident Analysis and Prediction
3.2.8 Cross-Validation of Protein Structural Class Prediction
3.3 Research Methodology – from Collecting Data to Suggesting Places
3.3.1 Data Sources (Our Data Points)
3.3.2 Analysis of the Venues Retrieved (Formatting and Cleaning)
3.3.3 Some Venues Have Been Replaced with New Venues
3.3.4 Clustering – Finding Similar Places
3.3.5 K-Means Clustering – the Hot Approach
3.4 Result and Analysis
3.4.1 Categories – Types of Restaurants
3.4.2 Average Rating for the Places
3.4.3 Average Price Per Person of Venues
3.5 Conclusion
References
4 Investigation on Mobile Forensics Tools to Decode Cyber Crime
4.1 Introduction to Mobile Forensics: Process and Methodology
4.2 Preservation of Evidences in Mobile Device
4.3 Acquisition from Mobile Device
4.4 Examination and Analysis: Tools and Techniques
4.5 SIM Forensics and Reporting of Evidences
4.6 Conclusion
References
5 Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications
5.1 Introduction
5.2 Microstrip Patch Antennas
5.3 Electromagnetic Bandgap Structure
5.4 Metamaterial Structure
5.5 Multiple Input and Multiple Output (MIMO) Systems
5.6 Techniques of Microstrip Patch Antennas
5.7 Advantages and Disadvantages
5.8 Applications
5.9 Tools of Microstrip Patch Antenna
5.10 Parameters of Microstrip Patch Antenna
5.11 Conclusion
References
6 Optical Encryption of Images Using Partial Pivoting Lower Upper Decomposition Based on Two Structured Deterministic Phase Masks in the Hybrid Transform Domain
6.1 Introduction
6.2 Theoretical Background
6.2.1 Discrete Cosine Transform
6.2.2 Fractional Fourier Transform
6.2.3 Structured Deterministic Phase Mask
6.3 Proposed Cryptosystem
6.4 Simulation and Evaluation
6.4.1 Statistical Analysis
6.4.2 Attack Analysis
6.4.3 NPCR and UACI Analysis
6.4.4 Key Sensitivity Analysis
6.5 Performance Comparison
6.6 Conclusion
References
7 A Comparative Analysis of Blockchain Integrated IoT Applications
7.1 Introduction
7.2 Introduction to Internet of Things
7.2.1 IoT Architecture
7.2.2 Challenges in IoT
7.3 Introduction to Blockchain
7.3.1 Important Features of Blockchain
7.3.2 Types of Blockchain Models
7.3.3 Blockchain Benefits
7.3.4 Technology for Secure Blockchain Architecture
7.4 Integration of Blockchain and IoT
7.4.1 Advantages of Using Blockchain IoT
7.5 Analysis of Various IoT Applications with Blockchain
7.5.1 Supply Chain
7.5.2 Ride Hiring System
7.5.3 Solar Energy
7.5.4 Printing Machine
7.5.5 Home Space
7.5.6 Waste Management
7.5.7 Agriculture System
7.5.8 Healthcare System
7.5.9 Miscellaneous Applications
7.5.10 Application Implementation
7.5.11 Analysis of Blockchain Integrated IoT Applications
7.6 Conclusion and Summary
References
8 Blockchain A New Power-Driven Technology for Smart Cities
8.1 Introduction: Background and Driving Forces
8.2 Solar Energy Smart Grid Powered with Blockchain
8.3 Feedback and Opinion Gathering with Blockchain
8.4 Conducting Elections and Referendums
8.5 Citizen Rating Based on Environmental Awareness
8.6 Secure Storage of Private and Sensitive Data of Citizens
8.7 Generating New Streams of Income for Local Administrative and Municipal Bodies
8.8 Blockchain-Based Universal Identification
8.9 Education
8.10 Healthcare
8.11 Parking Management
8.12 Resource Management
8.13 Resource Management
8.14 Limitation of Blockchain
8.15 Conclusion
References
9 Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks Based on Lattice Behavioral Using Spread Spectral Soft-Max-Recurrent Neural Networks
9.1 Introduction
9.2 Related Work
9.3 Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks
9.3.1 Data Preprocessing
9.3.2 Lattice Behavioral Access Rate (LBAW)
9.3.3 Social Spider Comp Feature Section (S2CFS)
9.3.4 Mutual Scaling Features and Ranking
9.3.5 Soft-Max Logical Activation Function (SmLAF)
9.3.6 Spread Spectral Recurrent Neural Network (S2RNN)
9.4 Result and Discussion
9.5 Conclusion
References
10 Provably Secure Role Delegation Scheme for Medical Cyber-Physical Systems
10.1 Introduction
10.1.1 Proxy Signature Technique
10.1.2 Forward-Secure Technique
10.2 Related Work
10.2.1 Case Study
10.3 Framework for Proposed Methodology
10.3.1 The Proposed PB-FSPS Algorithm
10.4 Protocol Analysis Using BAN Logic
10.4.1 Idealized Protocol
10.4.2 Initial Assumptions
10.4.3 Goals
10.4.4 Protocol Analysis
10.5 Simulation Study of PB-FSPS
10.6 Conclusion
References
11 FRAME Routing to Handle Security Attacks in Wireless Sensor Networks
11.1 Introduction
11.2 Literature Survey
11.3 FRAME Routing Algorithm
11.3.1 FRAME Routing
11.3.2 Bayesian Network
11.4 Results and Discussion
11.4.1 AODV Without Attacks
11.4.2 AODV with Attacks
11.4.3 FRAME Without Attacks
11.4.4 FRAME with Attacks
11.5 Conclusion
11.5.1 Summary of the Work
11.5.2 Performance Analysis and Conclusion
11.5.3 Future Scope
References
12 A Blockchain Security Management Based on Rehashing Shift Code Rail Encryption Using Circular Shift Round Random Padding Key for Decentralized Cloud Environment
12.1 Introduction
12.2 Related Work
12.3 Problem Consideration
12.4 Materials and Methods for Improved Blockchain Security
12.5 Hyperledger Transaction Security
12.6 Smart Contracting Security
12.7 Blockchain Initialization
12.8 Padding Key Substitution-Algorithm
12.9 Hash Key Generation on Padding
12.10 Circular Shifting Block Generation
12.11 Rehashing Shift Code Rail Encryption
12.12 Peer Verification on Exponential Session
12.13 Verified Authenticity Key Logs
12.14 Result and Discussion
12.15 Conclusion
References
13 Application of Exact Barrier-Penalty Function for Developing Privacy Mechanisms in Cyber-Physical Systems
13.1 Introduction
13.2 Related Work
13.3 Problem Formulation
13.4 Proposed Mechanism
13.5 Experimental Results
13.6 Future Scope
13.7 Conclusion
People also search for Security Analytics A Data Centric Approach to Information Security 1st:
data centric security approach
data-centric security
data centric security model
data centric security architecture
data-centric approach