Cyber security and digital forensics /
edited by Mangesh M. Ghonge [and more].
- 1 online resource.
- Advances in cyber security .
- Advances in cyber security. .
Includes bibliographical references and index.
A Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service-Oriented IoT Architecture / Ankur O Bang, Udai Pratap Rao, Amit A Bhusari -- Quantum and Post-Quantum Cryptography / Om Pal, Manoj Jain, BK Murthy, Vinay Thakur -- Artificial Neural Network Applications in Analysis of Forensic Science / KR Padma, KR Don -- A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications / Rashmi Salavi, M M Math, U P Kulkarni -- Understanding Robotics through Synthetic Psychology / Garima Saini, Shabnam -- An Insight into Digital Forensics: History, Frameworks, Types and Tools / G Maria Jones, S Godfrey Winster -- Digital Forensics as a Service: Analysis for Forensic Knowledge / Soumi Banerjee, Anita Patil, Dipti Jadhav, Gautam Borkar -- 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework / Neel A Patel, Dhairya A Parekh, Yash A Shah, Ramchandra Mangrulkar -- Ensuring Secure Data Sharing in IoT Domains Using Blockchain / Tawseef Ahmed Teli, Rameez Yousuf, Dawood Ashraf Khan -- A Review of Face Analysis Techniques for Conventional and Forensic Applications / HT Chethana, Trisiladevi C Nagavi -- Roadmap of Digital Forensics Investigation Process with Discovery of Tools / Anita Patil, Soumi Banerjee, Dipti Jadhav, Gautam Borkar -- Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach / Kaushik Dushyant, Garg Muskan, Annu, Ankur Gupta, Sabyasachi Pramanik -- Applications of Machine Learning Techniques in the Realm of Cybersecurity / Koushal Kumar, Bhagwati Prasad Pande -- Security Improvement Technique for Distributed Control System (DCS) and Supervisory Control-Data Acquisition (SCADA) Using Blockchain at Dark Web Platform / Anand Singh Rajawat, Romil Rawat, Kanishk Barhanpurkar -- Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications / Tun Myat Aung, Ni Ni Hla -- Ransomware: Threats, Identification and Prevention / Sweta Thakur, Sangita Chaudhari, Bharti Joshi.
9781119795667 1119795664
10.1002/9781119795667 doi
Computer security. Digital forensic science. Computer Security Sécurité informatique. Computer security. Digital forensic science.