My library button
  • Book cover of SCADA Security

    Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems—the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management—can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning. Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book: Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems Describes the relationship between main components and three generations of SCADA systems Explains the classification of a SCADA IDS based on its architecture and implementation Surveys the current literature in the field and suggests possible directions for future research SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.

  • Book cover of Responsible Graph Neural Networks

    More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete study in the area of graph learning in cyber, emphasizing graph neural networks (GNNs) and their cyber-security applications. Three parts examine the basics, methods and practices, and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber-security applications. The second part explains three different categories of graph learning, including deterministic, generative, and reinforcement learning and how they can be used for developing cyber defense models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms, and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

  • Book cover of Data Exfiltration Threats and Prevention Techniques

    DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection. Providing detailed descriptions of the recent advances in data exfiltration detection methods and technologies, the authors also discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Composed of eight chapters, this book presents a better understanding of the core issues related to the cyber-attacks as well as the recent methods that have been developed in the field. In Data Exfiltration Threats and Prevention Techniques, readers can expect to find detailed information on: Sensitive data classification, covering text pre-processing, supervised text classification, automated text clustering, and other sensitive text detection approaches Supervised machine learning technologies for intrusion detection systems, covering taxonomy and benchmarking of supervised machine learning techniques Behavior-based malware detection using API-call sequences, covering API-call extraction techniques and detecting data stealing behavior based on API-call sequences Memory-based sensitive data monitoring for real-time data exfiltration detection and advanced time delay data exfiltration attack and detection Aimed at professionals and students alike, Data Exfiltration Threats and Prevention Techniques highlights a range of machine learning methods that can be used to detect potential data theft and identifies research gaps and the potential to make change in the future as technology continues to grow.

  • Book cover of Fundamentals of Distributed Object Systems

    Distributed Object Computing teaches readers the fundamentals of CORBA, the leading architecture for design of software used in parallel and distributed computing applications. Since CORBA is based on open standards, it is the only effective way to learn object-oriented programming for distributed systems. This language independent book allows material to be taught using Java, C++ or other Object Oriented Programming Languages.

  • Book cover of Advances in Object-Oriented Data Modeling

    This book focuses on recent developments in representational and processing aspects of complex data-intensive applications.

  • Book cover of Blockchain Foundations and Applications

    This monograph provides a comprehensive and rigorous exposition of the basic concepts and most important modern research results concerning blockchain and its applications. The book includes the required cryptographic fundamentals underpinning the blockchain technology, since understanding of the concepts of cryptography involved in the design of blockchain is necessary for mastering the security guarantees furnished by blockchain. It also contains an introduction to cryptographic primitives, and separate chapters on bitcoin, ethereum and smart contracts, public blockchain, private blockchain, cryptocurrencies, and blockchain applications.This volume is of great interest to active researchers who are keen to develop novel applications of blockchain in the field of their investigatio. Further, it is also beneficial for industry practitioners as well as undergraduate students in computing and information technology.

  • Book cover of On the Move to Meaningful Internet Systems: OTM 2008 Workshops

    This volume constitutes the refereed proceedings of 13 international workshops held as part of OTM 2008 in Monterrey, Mexico, in November 2008. The 106 revised full papers presented were carefully reviewed and selected from a total of 171 submissions to the workshops. The volume starts with 19 additional revised poster papers of the OTM 2008 main conferences CoopIS and ODBASE. Topics of the workshop papers are ambient data integration (ADI 2008), agents and web services merging in distributed environment (AWeSoMe 2008), community-based evolution of knowledge-intensive systems (COMBEK 2008), enterprise integration, interoperability and networking (EI2N 2008), system/software architectures (IWSSA 2008), mobile and networking technologies for social applications (MONET 2008), ontology content and evaluation in enterprise & quantitative semantic methods for the internet (OnToContent and QSI 2008), object-role modeling (ORM 2008), pervasive systems (PerSys 2008), reliability in decentralized distributed systems (RDDS 2008), semantic extensions to middleware enabling large scale knowledge (SEMELS 2008), and semantic Web and Web semantics (SWWS 2008).

  • Book cover of Verification of Communication Protocols in Web Services

    In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have been putting various efforts and coming up with innovative ideas. Within the last few years, we have seen a steep growth of research works particularly on various sensor node organization issues. The objective of this book is to gather recent advancements in the fields of self-organizing wireless sensor networks as well as to provide the readers with the essential information about sensor networking.

  • Book cover of On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops
    Zahir Tari

     · 2007

    This two-volume set LNCS 4805/4806 constitutes the refereed proceedings of 10 international workshops and papers of the OTM Academy Doctoral Consortium held as part of OTM 2007 in Vilamoura, Portugal, in November 2007. The 126 revised full papers presented were carefully reviewed and selected from a total of 241 submissions to the workshops. The first volume begins with 23 additional revised short or poster papers of the OTM 2007 main conferences.

  • Book cover of On the Performance of Web Services

    Performance of Web Services provides innovative techniques to improve the performance of Web Services, as well as QoS (Quality of Service) requirements. This includes Qos performance, reliability and security. The author presents two levels of Web Services: the “kernel” (ithe SOAP engine which delivers messages from one point to another through various networks), and the “server side” (which processes heavy load / requests). The primary objective of this book is execution of applications delivered in a timely fashion. Case studies and examples are provided throughout this book.