Название: Security and Authentication: Perspectives, Management and Challenges Автор: Ong Thian Song, Tee Connie, Mohd Shohel Sayeed Издательство: Nova Science Publishers, Inc. Год: 2018 ISBN: 9781536129434 Серия: Cybercrime and Cybersecuriy Research Формат: pdf Страниц: 271 Размер: 10,5 mb Язык: English
Issues around security and privacy have received greater attention as the world becomes more digitized and interconnected. There are a myriad of technological advances like smart mobile devices, wearable devices, Internet of Things (IoTs), cloud computing and social networks that benefit people all over the world, transforming how they work and communicate with each other. However, these new technologies also bring new security and privacy challenges. For example, there are massive attacks by malicious malware like WannaCry that cost great financial loss to individuals and institutions. Besides, there are ample amounts of software and programs that quitely collect, share and sometimes disclose huge amounts of personal information.
This book presents the current popular issues in information security and privacy, covering human users, hardware and software, the Internet and also communication protocols. The book provides a comprehensive combination of studies that offer integrated solutions to security and authentication problems. The topics covered in the book include mobile authentication systems, security in wireless sensor networks and IoTs, network-based intrusion detection systems, privacy protection in machine learning, deep learning for surveillance, and also targeted image forensics. An understanding of these areas ensures the ability to adapt to and address new challenges in the technological dependent world as these fields evolve.
The primary target audiences of this book are students and researchers from security technology and information technology management. The editors have been blessed by the assistance of many people concerning all aspects for the preparation of this book. The editors would like to express their sincere gratitude to the anonymous reviewers for their professional support and dedication to reviewing the chapters of this book. Last but not least, special thanks also go out to Nova Science Publishers for presenting the opportunity to prepare and publish this book.
Chapter 1. State-Of-The-Art Authentication Techniques: Threats and Vulnerabilities (Chin Poo Lee and Kian Ming Lim, Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia)
Chapter 2. Privacy Protection in Machine Learning: The State-of-the-Art for a Private Decision Tree (Yee Jian Chew, Kok-Seng Wong, and Shih Yin Ooi, Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia, and others)
Chapter 3. Key Distribution and Management in Cryptography (Bachir Bendrissou and Yean Li Ho, Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia)
Chapter 4. Targeted Image Forensics (Rimba Whidiana Ciptasari, School of Computing, Telkom University, Bandung, Indonesia)
Chapter 5. Deep Learning for Abnormal Behavior Detection (Nian Chi Tay, Pin Shen Teh, and Siok Wah Tay, Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia, and others)
Chapter 6. Security Issues in Wireless Sensor Networks and IoT (Jayakumar Vaithiyashankar, Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia)
Chapter 7. Finger Vein Biometrics: The Future for a Mobile Authentication System (Ahmad Syarif Munalih and William Ardianto, Information Security Lab, MIMOS Bhd, Kuala Lumpur, Malaysia, and others)
Chapter 8. Android Device Misplacement Remedy via Bluetooth-Enabled Technology (Siew-Chin Chong and Kaven Raj S/O Manoharan, Faculty of Information Science & Technology, Multimedia University, Melaka, Malaysia)
Chapter 9. A Labeled Network-Based Anomaly Intrusion Detection System (IDS) Dataset (Shih Yin Ooi, Nicholas Ming Ze Lee, Yong Kian Lee, and Ying Han Pang, Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia)
Chapter 10. Seamless Biometrics for a Smart Office (Ting Yong Soh and Michael Kah Ong Goh, Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia)
Chapter 11. Hiding Information Within a QR Code Based on a Color Subcell (SQRC) (Ari Moesriami Barmawi and Yudha Viki Alvionata, Informatics Graduate Program, School of Computing, Telkom University, Bandung, Indonesia)
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.