Cantitate/Preț
Produs

Security and Privacy in Smart Environments: Lecture Notes in Computer Science, cartea 14800

Editat de Nikolaos Pitropakis, Sokratis Katsikas
en Limba Engleză Paperback – 26 sep 2024
This volume gives readers an understanding of the multifaceted threats posed by the evolving cybersecurity landscape in smart environments, while also offering strategic insights into mitigative measures and proactive solutions.
The chapters in the first part explain the current state of smart environments, shedding light on their complexities and vulnerabilities. The second part provides a fresh perspective on existing technologies and cyber challenges within the context of the modern era, offering novel insights and analyses. The third part is dedicated to exploring the intricacies of critical infrastructures. The concluding section offers a succinct overview of distributed ledger and privacy enhancement approaches, underscoring their potential role in fortifying cybersecurity measures.
The contributors are among the leading researchers in the areas of smart environments, information security, and privacy, and the content will be of value to researchers in academia and industry, and security practitioners and policymakers.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32006 lei

Preț vechi: 40007 lei
-20% Nou

Puncte Express: 480

Preț estimativ în valută:
5663 6650$ 4971£

Carte tipărită la comandă

Livrare economică 27 ianuarie-10 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031667077
ISBN-10: 3031667077
Pagini: 280
Ilustrații: Approx. 280 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.43 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Current State of Smart Environments.- Methodological Resilience Assessment of Smart Cyber Infrastructures.- Query Integrity in Smart Environments.- Quantifying the Impact Propagation of Cyber Attacks using Business Logic Modeling.- Technologies And Challenges.- Enabling the Human-as-a-security-sensor paradigm in the Internet of Things.- Intrusion Detection at the IoT Edge using Federated Learning.- Bits and Bytes Betrayal: Unravelling the Dark Threads of Cybercrime in the Metaverse.- Intricacies Of Critical Infrastructures.- Smart Environments: Information Flow Control in Smart Grids.- Social Engineering: The Human Behavior Impact in Cyber Security Within Critical Information Infrastructures.- Distributed Ledger And Privacy Enhancement Approaches.- An overview of security issues for blockchain based distributed applications - A Critical View on Blockchain Rollups.- Decentralized Identity Management and the European Identity Reform.- Designing secure and privacy-aware IoT services in the health sector.

Textul de pe ultima copertă

This volume gives readers an understanding of the multifaceted threats posed by the evolving cybersecurity landscape in smart environments, while also offering strategic insights into mitigative measures and proactive solutions.
The chapters in the first part explain the current state of smart environments, shedding light on their complexities and vulnerabilities. The second part provides a fresh perspective on existing technologies and cyber challenges within the context of the modern era, offering novel insights and analyses. The third part is dedicated to exploring the intricacies of critical infrastructures. The concluding section offers a succinct overview of distributed ledger and privacy enhancement approaches, underscoring their potential role in fortifying cybersecurity measures.
The contributors are among the leading researchers in the areas of smart environments, information security, and privacy, and the content will be of value to researchers in academia and industry, and security practitioners and policymakers.

Caracteristici

Fresh perspective on existing technologies and cyber challenges in the modern context Succinct overview of distributed ledger and privacy enhancement approaches, and their role in cybersecurity Presents mitigative measures and proactive solutions