Emerging Trends in Cybersecurity Applications

Emerging Trends in Cybersecurity Applications [electronic resource] / edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun. - 1st ed. 2023. - XVII, 465 p. 170 illus., 127 illus. in color. online resource.

Introduction -- Cybersecurity Applications in Data Science -- Cybersecurity Applications in Internet of Things -- Cybersecurity Applications in Artificial Intelligence -- Cybersecurity Applications in Robotics -- Cybersecurity Applications in Web -- Cybersecurity Applications in High-Tech Systems -- Cybersecurity Applications in Cyber-Physical Systems -- Cybersecurity Applications in Mobile Devices -- Cybersecurity Applications in Digital Media -- Cybersecurity Applications in Cloud Computing -- Cybersecurity Applications in Distributed Systems -- Cybersecurity Applications in Vehicles -- Cybersecurity Applications in Supply Chain -- Cybersecurity Applications in Trustworthy Computing -- Cybersecurity Applications in Databases -- Cybersecurity Applications in Operating Systems -- Cybersecurity Applications in Software -- Cybersecurity Applications in Virtualization -- Cybersecurity Applications in Biometrics -- Cybersecurity Applications in Education -- Cybersecurity Applications in Blockchains -- Conclusion.

This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional developmentefforts and to students as a supplement to their cybersecurity courses.

9783031096402

10.1007/978-3-031-09640-2 doi


Telecommunication.
Cooperating objects (Computer systems).
Computational intelligence.
Security systems.
Communications Engineering, Networks.
Cyber-Physical Systems.
Computational Intelligence.
Security Science and Technology.

TK5101-5105.9

621,382
© 2024 IIIT-Delhi, library@iiitd.ac.in