- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
In this fast-paced global economy, academia and industry must innovate to evolve and succeed. Today's researchers and industry experts are seeking transformative technologies to meet the challenges of tomorrow. Cutting-edge technological advances in cybersecurity solutions aid in enabling the security of complex heterogeneous high-performance computing (HPC) environments. On the other hand, HPC facilitates powerful and intelligent innovative models for reducing time to response to identify and resolve a multitude of potential, newly emerging cyberattacks.
Cybersecurity and High-Performance Computing Environments provides a collection of the current and emergent research innovations, practices, and applications focusing on the interdependence of cybersecurity and HPC domains for discovering and resolving new emerging cyber-threats.
KEY FEATURES
Represents a substantial research contribution to the state-of-the-art solutions for addressing the threats to confidentiality, integrity, and availability (CIA triad) in HPC environments
Covers the groundbreaking and emergent solutions that utilize the power of the HPC environments to study and understand the emergent, multifaceted, anomalous, and malicious characteristics
The content will help university students, researchers, and professionals understand how HPC research fits broader cybersecurity objectives and vice versa.
Contents
PREFACE. EDITORS. CONTRIBUTORS. Chapter 1 Cybersecurity and High-Performance Computing Ecosystems: Opportunities and Challenges. Chapter 2 Approaches to Working with Large-Scale Graphs for Cybersecurity Applications. Chapter 3 OMNI at the Edge. Chapter 4 Optimized Voronoi-Based Algorithms for Parallel Shortest Vector Computation. Chapter 5 Attribute-Based Secure Keyword Search for Cloud Computing. Chapter 6 Understanding Cybersecurity Risk in FMI Using HPC. Chapter 7 Live Migration in HPC. Chapter 8 Security-Aware Real-Time Transmission for Automotive CAN-FD Networks. Chapter 9 OntoEnricher: A Deep Learning Approach for Ontology Enrichment from Unstructured Text. Chapter 10 Intelligent Connected Vehicles. Chapter 11 Toward Robust Deep Learning Systems against Deepfake for Digital Forensics. Chapter 12 Monitoring HPC Systems against Compromised SSH. Index.