- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The ebook edition of this title is Open Access and freely available to read online.
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project's methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics.
Contents
Chapter 1. How to Design and Set Architecture for Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platforms
Chapter 2. The Cyber-Trust Paradigm of Procedural Aspects for Cybersecurity Research Impact Assessment
Chapter 3. Cyber-Threat Intelligence
Chapter 4. Moving-Target Defense Techniques for Mitigating Sophisticated IoT Threats
Chapter 5. Cyber-Threat Detection in the IoT
Chapter 6. Utilising Honeypots and Machine Learning to Mitigate Unknown Threats in IoT
Chapter 7. Towards Post-Quantum Blockchain Platforms
Chapter 8. Trust Management System Architecture for the Internet of Things
Chapter 9. Cyber-Trust Evaluation Process
Chapter 10. Smart Home Testbeds for Business
Chapter 11. Securing Today's Complex Digital Realities
Chapter 12. Security and Privacy in Digital Twins



