Author: Stepan Bilan
Publisher: Springer Nature
ISBN: 3030483789
Category : Technology & Engineering
Languages : en
Pages : 203
Book Description
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.
Biometric Identification Technologies Based on Modern Data Mining Methods
Author: Stepan Bilan
Publisher: Springer Nature
ISBN: 3030483789
Category : Technology & Engineering
Languages : en
Pages : 203
Book Description
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.
Publisher: Springer Nature
ISBN: 3030483789
Category : Technology & Engineering
Languages : en
Pages : 203
Book Description
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.
Cyber Space and Outer Space Security
Author: Karthikeyan Periyasami
Publisher: CRC Press
ISBN: 8770046379
Category : Technology & Engineering
Languages : en
Pages : 293
Book Description
This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace solutions to counteract attacks. The discussion extends to mitigation strategies against weaponized AI in cyber-attacks, countermeasures for both autonomous vehicles and cyberspace attacks, as well as the limitations and future prospects of artificial intelligence (AI) and data defense in aerospace cybersecurity. A network comprising nodes can establish both cyberspace and outer space platforms for data exchange. Cyberspace finds diverse applications, including commercial endeavors and military defense. The integration of autonomous vehicles, unmanned aircraft systems (UAS), and drones into outer space environments is facilitated through their connection to cyberspace. One illustrative example involves the utilization of blockchain-based secure drone systems for product delivery, leveraging the combined capabilities of cyberspace and outer space security technologies. This book elucidates the intricate dynamics between cyber operations and the expanding realm of autonomous outer cyberspace, presenting new security challenges arising from heightened complexity and emerging vulnerabilities.
Publisher: CRC Press
ISBN: 8770046379
Category : Technology & Engineering
Languages : en
Pages : 293
Book Description
This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace solutions to counteract attacks. The discussion extends to mitigation strategies against weaponized AI in cyber-attacks, countermeasures for both autonomous vehicles and cyberspace attacks, as well as the limitations and future prospects of artificial intelligence (AI) and data defense in aerospace cybersecurity. A network comprising nodes can establish both cyberspace and outer space platforms for data exchange. Cyberspace finds diverse applications, including commercial endeavors and military defense. The integration of autonomous vehicles, unmanned aircraft systems (UAS), and drones into outer space environments is facilitated through their connection to cyberspace. One illustrative example involves the utilization of blockchain-based secure drone systems for product delivery, leveraging the combined capabilities of cyberspace and outer space security technologies. This book elucidates the intricate dynamics between cyber operations and the expanding realm of autonomous outer cyberspace, presenting new security challenges arising from heightened complexity and emerging vulnerabilities.
Quantum Computing in Cybersecurity
Author: Romil Rawat
Publisher: John Wiley & Sons
ISBN: 1394167385
Category : Computers
Languages : en
Pages : 440
Book Description
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library.
Publisher: John Wiley & Sons
ISBN: 1394167385
Category : Computers
Languages : en
Pages : 440
Book Description
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library.
Information Security and Optimization
Author: Rohit Tanwar
Publisher: CRC Press
ISBN: 1000220532
Category : Computers
Languages : en
Pages : 224
Book Description
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
Publisher: CRC Press
ISBN: 1000220532
Category : Computers
Languages : en
Pages : 224
Book Description
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
Internet of Things (IoT) for Automated and Smart Applications
Author: Yasser Ismail
Publisher: BoD – Books on Demand
ISBN: 1789840953
Category : Computers
Languages : en
Pages : 154
Book Description
Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader understand the principle of using IoT in such applications.
Publisher: BoD – Books on Demand
ISBN: 1789840953
Category : Computers
Languages : en
Pages : 154
Book Description
Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader understand the principle of using IoT in such applications.
Research Anthology on Privatizing and Securing Data
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799889556
Category : Computers
Languages : en
Pages : 2188
Book Description
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.
Publisher: IGI Global
ISBN: 1799889556
Category : Computers
Languages : en
Pages : 2188
Book Description
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.
AI and IoT for Sustainable Development in Emerging Countries
Author: Zakaria Boulouard
Publisher: Springer Nature
ISBN: 3030906183
Category : Technology & Engineering
Languages : en
Pages : 638
Book Description
This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in a large pool of fields where AI and IoT can open up new horizons. Artificial intelligence and Internet of Things have introduced themselves today as must-have technologies in almost every sector. Ranging from agriculture to industry and health care, the scope of applications of AI and IoT is as wide as the horizon. Nowadays, these technologies are extensively used in developed countries, but they are still at an early stage in emerging countries. AI and IoT for Sustainable Development in Emerging Countries—Challenges and Opportunities is an invaluable source to dive into the latest applications of AI and IoT and how they have been used by researchers from emerging countries to solve sustainable development-related issues by taking into consideration the specifities of their countries. This book starts by presenting how AI and IoT can tackle the challenges of sustainable development in general and then focuses on the following axes: · AI and IoT for smart environment and energy · Industry 4.0 and intelligent transportation · A vision towards an artificial intelligence of medical things · AI, social media, and big data analytics. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in these particular areas or those interested in grasping its diverse facets and exploring the latest advances on their respective fields and the role of AI and IoT in them.
Publisher: Springer Nature
ISBN: 3030906183
Category : Technology & Engineering
Languages : en
Pages : 638
Book Description
This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in a large pool of fields where AI and IoT can open up new horizons. Artificial intelligence and Internet of Things have introduced themselves today as must-have technologies in almost every sector. Ranging from agriculture to industry and health care, the scope of applications of AI and IoT is as wide as the horizon. Nowadays, these technologies are extensively used in developed countries, but they are still at an early stage in emerging countries. AI and IoT for Sustainable Development in Emerging Countries—Challenges and Opportunities is an invaluable source to dive into the latest applications of AI and IoT and how they have been used by researchers from emerging countries to solve sustainable development-related issues by taking into consideration the specifities of their countries. This book starts by presenting how AI and IoT can tackle the challenges of sustainable development in general and then focuses on the following axes: · AI and IoT for smart environment and energy · Industry 4.0 and intelligent transportation · A vision towards an artificial intelligence of medical things · AI, social media, and big data analytics. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in these particular areas or those interested in grasping its diverse facets and exploring the latest advances on their respective fields and the role of AI and IoT in them.
Development in E-waste Management
Author: Biswajit Debnath
Publisher: CRC Press
ISBN: 100087317X
Category : Science
Languages : en
Pages : 258
Book Description
This book concerns the developments in the field of e-waste management with a particular focus on urban mining, sustainability, and circular economy aspects. It explains e-waste recycling technologies, supply chain aspects, and e-waste disposal in IT industries, including health and environmental effects of e-waste recycling processes, and associated issues, challenges, and solutions. Further, it describes the economic potential of resource recovery from e-waste. Features: Covers recent developments in e-waste management Explores technological advances, such as nanotech from e-waste, MREW, fungal biotech, and so forth Reviews electronic component recycling aspects Discusses the implementation of circular economy in the e-waste sector Includes urban mining and sustainability aspects of e-waste This book is aimed at graduate students and researchers in environmental engineering, waste management, urban mining, circular economy, waste processing, electronics, and telecommunication engineering, electrical and electronics engineering, and chemical engineering.
Publisher: CRC Press
ISBN: 100087317X
Category : Science
Languages : en
Pages : 258
Book Description
This book concerns the developments in the field of e-waste management with a particular focus on urban mining, sustainability, and circular economy aspects. It explains e-waste recycling technologies, supply chain aspects, and e-waste disposal in IT industries, including health and environmental effects of e-waste recycling processes, and associated issues, challenges, and solutions. Further, it describes the economic potential of resource recovery from e-waste. Features: Covers recent developments in e-waste management Explores technological advances, such as nanotech from e-waste, MREW, fungal biotech, and so forth Reviews electronic component recycling aspects Discusses the implementation of circular economy in the e-waste sector Includes urban mining and sustainability aspects of e-waste This book is aimed at graduate students and researchers in environmental engineering, waste management, urban mining, circular economy, waste processing, electronics, and telecommunication engineering, electrical and electronics engineering, and chemical engineering.
Cyber Crime: Concepts, Methodologies, Tools and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1613503245
Category : Computers
Languages : en
Pages : 1885
Book Description
Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
Publisher: IGI Global
ISBN: 1613503245
Category : Computers
Languages : en
Pages : 1885
Book Description
Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
Human Factors in Cybersecurity
Author: Tareq Ahram and Waldemar Karwowski
Publisher: AHFE International
ISBN: 195865129X
Category : Technology & Engineering
Languages : en
Pages : 168
Book Description
Human Factors in Cybersecurity Proceedings of the 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022), July 24–28, 2022, New York, USA
Publisher: AHFE International
ISBN: 195865129X
Category : Technology & Engineering
Languages : en
Pages : 168
Book Description
Human Factors in Cybersecurity Proceedings of the 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022), July 24–28, 2022, New York, USA