Advertisement

Cybersecurity and Secure Information Systems

Challenges and Solutions in Smart Environments

  • Aboul Ella Hassanien
  • Mohamed Elhoseny
Book

Table of contents

  1. Front Matter
    Pages i-x
  2. Alka Verma, Abhirup Khanna, Amit Agrawal, Ashraf Darwish, Aboul Ella Hassanien
    Pages 1-15
  3. M. Durairaj, K. Muthuramalingam
    Pages 17-29
  4. K. Shankar, Mohamed Elhoseny, Eswaran Perumal, M. Ilayaraja, K. Sathesh Kumar
    Pages 31-42
  5. N. B. Harikrishnan, R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran
    Pages 43-65
  6. R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, S. Akarsh, Mohamed Elhoseny
    Pages 87-124
  7. R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, S. Akarsh
    Pages 125-160
  8. R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, S. Akarsh, Mohamed Elhoseny
    Pages 161-192
  9. P. Manickam, K. Shankar, Eswaran Perumal, M. Ilayaraja, K. Sathesh Kumar
    Pages 193-204
  10. Muzafer Saračević, Aybeyan Selimi, Šemsudin Plojović
    Pages 205-226
  11. A. Bhuvaneshwaran, P. Manickam, M. Ilayaraja, K. Sathesh Kumar, K. Shankar
    Pages 227-240
  12. C. DeCusatis, R. Cannistra, A. Labouseur, M. Johnson
    Pages 287-310
  13. Back Matter
    Pages 311-314

About this book

Introduction

This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. 

The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. 

Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.


Keywords

Cybersecurity Challenges Secure Information Systems Secure Smart Applications Secure Data Processing Smart Networks Security Security Procedures for IoT Applications Secure data gathering in IoT applications. Secure Data Encryption Models Secure Interfaces Mobile Cloud Computing Secure Geo-processing Secure Spatial Data Techniques and Tools Wireless Security SCADA Systems Smart Grid Security Urban Transportation System Security

Editors and affiliations

  • Aboul Ella Hassanien
    • 1
  • Mohamed Elhoseny
    • 2
  1. 1.Faculty of Computers and InformationCairo UniversityGizaEgypt
  2. 2.Faculty of Computer and Information SciencesMansoura UniversityMansouraEgypt

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-16837-7
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-16836-0
  • Online ISBN 978-3-030-16837-7
  • Series Print ISSN 1613-5113
  • Series Online ISSN 2363-9466
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering