Advertisement

Handbook of Big Data Privacy

  • Kim-Kwang Raymond Choo
  • Ali Dehghantanha
Book

Table of contents

  1. Front Matter
    Pages i-ix
  2. Amin Azmoodeh, Ali Dehghantanha
    Pages 1-5
  3. Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi
    Pages 7-36
  4. Abdulrahman Al-Abassi, Hadis Karimipour, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi
    Pages 37-61
  5. Mostafa Farhdi Moghadam, Amirhossein Mohajerzdeh, Hadis Karimipour, Hamid Chitsaz, Roya Karimi, Behzad Molavi
    Pages 63-76
  6. Shamim Yousefi, Farnaz Derakhshan, Hadis Karimipour
    Pages 77-108
  7. William Peters, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava
    Pages 109-120
  8. Suby Singh, Hadis Karimipour, Hamed HaddadPajouh, Ali Dehghantanha
    Pages 121-164
  9. Mahdi Amrollahi, Shahrzad Hadayeghparast, Hadis Karimipour, Farnaz Derakhshan, Gautam Srivastava
    Pages 165-189
  10. Mridula Sharma, Haytham Elmiligi, Fayez Gebali
    Pages 191-217
  11. Hossein Mohammadi Rouzbahani, Hadis Karimipour, Abolfazl Rahimnejad, Ali Dehghantanha, Gautam Srivastava
    Pages 219-235
  12. Hossein Mohammadi Rouzbahani, Hadis Karimipour, Gautam Srivastava
    Pages 237-254
  13. Jesus Castillo Cabello, Hadis Karimipour, Amir Namavar Jahromi, Ali Dehghantanha, Reza M. Parizi
    Pages 255-283
  14. Wenyu Han, Amin Azmoodeh, Hadis Karimipour, Simon Yang
    Pages 285-303
  15. Sanaz Nakhodchi, Ali Dehghantanha, Hadis Karimipour
    Pages 305-318
  16. Mahdi Amrollahi, Ali Dehghantanha, Reza M. Parizi
    Pages 319-342
  17. Mahdis Saharkhizan, Amin Azmoodeh, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava
    Pages 343-357
  18. Mohammad Nassiri, Hamed HaddadPajouh, Ali Dehghantanha, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava
    Pages 359-370
  19. Mohammad Mehdi BehradFar, Hamed HaddadPajouh, Ali Dehghantanha, Amin Azmoodeh, Hadis Karimipour, Reza M. Parizi et al.
    Pages 371-383
  20. Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi, Sattar Hashemi, Bahram Gharabaghi, Gautam Srivastava
    Pages 385-397

About this book

Introduction

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. 

The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks.  The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments.  

This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Keywords

cyber threat cyber security privacy big data threat intelligence machine learning cyber forensics intrusion detection incident response cyber defense malware campaign detection indicators of compromise evidence correlation data security

Editors and affiliations

  1. 1.University of Texas at San AntonioSan AntonioUSA
  2. 2.Cyber Science Lab, School of Computer ScienceUniversity of GuelphGuelphCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-38557-6
  • Copyright Information Springer Nature Switzerland AG 2020
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-38556-9
  • Online ISBN 978-3-030-38557-6
  • Buy this book on publisher's site
Industry Sectors
Pharma
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering