• Complain

Shengjie Xu - Cybersecurity in Intelligent Networking Systems (IEEE Press)

Here you can read online Shengjie Xu - Cybersecurity in Intelligent Networking Systems (IEEE Press) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Wiley-IEEE Press, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Cybersecurity in Intelligent Networking Systems (IEEE Press): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybersecurity in Intelligent Networking Systems (IEEE Press)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS

Help protect your network system with this important reference work on cybersecurity

Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online servicessuch as e-commerce, e-health, social networks, and other major cyber applicationsit has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy.

Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cybersecurity, privacy preservation, and adversarial machine learning. It offers a comprehensive introduction to exploring technologies, applications, and issues in data-driven cyber infrastructure. It describes a proposed novel, data-driven network intelligence system that helps provide robust and trustworthy safeguards with edge-enabled cyber infrastructure, edge-enabled artificial intelligence (AI) engines, and threat intelligence. Focusing on encryption-based security protocol, this book also highlights the capability of a network intelligence system in helping target and identify unauthorized access, malicious interactions, and the destruction of critical information and communication technology.

Cybersecurity in Intelligent Networking Systems readers will also find:

  • Fundamentals in AI for cybersecurity, including artificial intelligence, machine learning, and security threats
  • Latest technologies in data-driven privacy preservation, including differential privacy, federated learning, and homomorphic encryption
  • Key areas in adversarial machine learning, from both offense and defense perspectives
  • Descriptions of network anomalies and cyber threats
  • Background information on data-driven network intelligence for cybersecurity
  • Robust and secure edge intelligence for network anomaly detection against cyber intrusions
  • Detailed descriptions of the design of privacy-preserving security protocols

Cybersecurity in Intelligent Networking Systems is an essential reference for all professional computer engineers and researchers in cybersecurity and artificial intelligence, as well as graduate students in these fields.

Shengjie Xu: author's other books


Who wrote Cybersecurity in Intelligent Networking Systems (IEEE Press)? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cybersecurity in Intelligent Networking Systems (IEEE Press) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybersecurity in Intelligent Networking Systems (IEEE Press)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents List of Tables Chapter 1 Chapter 2 Chapter 4 Chapter - photo 1
Table of Contents
List of Tables
  1. Chapter 1
  2. Chapter 2
  3. Chapter 4
  4. Chapter 5
  5. Chapter 6
  6. Chapter 7
List of Illustrations
  1. Chapter 1
  2. Chapter 2
  3. Chapter 3
  4. Chapter 4
  5. Chapter 5
  6. Chapter 6
  7. Chapter 7
  8. Chapter 8
Guide
Pages
Cybersecurity in Intelligent Networking Systems

Shengjie Xu
San Diego State University, USA

Yi Qian
University of NebraskaLincoln, USA

Rose Qingyang Hu
Utah State University, USA

This edition first published 2023 2023 John Wiley Sons Ltd All rights - photo 2

This edition first published 2023
2023 John Wiley & Sons Ltd

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

The right of Shengjie Xu, Yi Qian, and Rose Qingyang Hu to be identified as the authors of this work has been asserted in accordance with law.

Registered Offices
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by printondemand. Some content that appears in standard print versions of this book may not be available in other formats.

Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress Cataloging-in-Publication Data
Names: Xu, Shengjie (Professor), author. | Qian, Yi, 1962- author. | Hu,
Rose Qingyang, author.
Title: Cybersecurity in intelligent networking systems / Shengjie Xu, Yi
Qian, Rose Qingyang Hu.
Description: Chichester, West Sussex, UK : Wiley, [2023] | Includes
bibliographical references and index.
Identifiers: LCCN 2022033498 (print) | LCCN 2022033499 (ebook) | ISBN
9781119783916 (hardback) | ISBN 9781119784104 (adobe pdf) | ISBN
9781119784128 (epub)
Subjects: LCSH: Computer networksSecurity measures.
Classification: LCC TK5105.59 .X87 2023 (print) | LCC TK5105.59 (ebook) |
DDC 005.8dc23/eng/20220826
LC record available at https://lccn.loc.gov/2022033498
LC ebook record available at https://lccn.loc.gov/2022033499

Cover Design: Wiley
Cover Image: jijomathaidesigners/Shutterstock

About the Authors

Shengjie Xu, PhD, is an assistant professor in the Management Information Systems Department at San Diego State University, USA. He is a recipient of the IET Journals Premium Award for Best Paper in 2020, the Milton E. Mohr Graduate Fellowship Award from the University of NebraskaLincoln in 2017, and the Best Poster Award from the International Conference on Design of Reliable Communication Networks in 2015. He serves as a Technical Editor for IEEE Wireless Communications Magazine. He holds multiple professional certifications in cybersecurity and computer networking.

Yi Qian, PhD, is a professor in the Department of Electrical and Computer Engineering at the University of NebraskaLincoln, USA. He is a recipient of the Henry Y. Kleinkauf Family Distinguished New Faculty Teaching Award in 2011, the Holling Family Distinguished Teaching Award in 2012, the Holling Family Distinguished Teaching/Advising/Mentoring Award in 2018, and the Holling Family Distinguished Teaching Award for Innovative Use of Instructional Technology in 2018, all from the University of NebraskaLincoln, USA.

Rose Qingyang Hu, PhD, is a professor in the Department of Electrical and Computer Engineering and Associate Dean of Research in the College of Engineering at Utah State University, USA. She is a recipient of outstanding faculty researcher of the year in 2014 and 2016 and outstanding graduate mentor of the year in 2022, all from Utah State University, USA. She is a Fellow of IEEE, IEEE ComSoc Distinguished Lecturer 20152018, IEEE VTS Distinguished Lecturer 20202022.

Preface

Nowadays, malicious attacks and emerging cyber threats have been inducing catastrophic damage to critical infrastructure and causing widespread outages. There are three major types of cyberattacks that are compromising modern networking systems: (i) Attacks targeting Confidentiality intend to acquire unauthorized information from network resources; (ii) Attacks targeting Integrity aim at deliberately and illegally modifying or disrupting data exchange; and (iii) Attacks targeting Availability attempt to delay, block or corrupt service delivery. Confidentiality, integrity, and availability are the three pillars of cybersecurity. It is urgent to defend critical networking systems against any forms of cyber threats from adversaries.

The rapid and successful advances of intelligent discoveries offer security researchers and practitioners new platforms to investigate challenging issues emerging in several networking systems. Those intelligent solutions will boost the efficiency and effectiveness of multiple critical security applications. Motivated by the current technological advances, this book intends to offer the current research challenges in the field of cybersecurity, as well as some novel security solutions that make critical networking systems secure, robust, and intelligent. Specifically, the book focuses on cybersecurity and its intersections with artificial intelligence, machine learning, edge computing, and privacy preservation. There are eight chapters in the book.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybersecurity in Intelligent Networking Systems (IEEE Press)»

Look at similar books to Cybersecurity in Intelligent Networking Systems (IEEE Press). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybersecurity in Intelligent Networking Systems (IEEE Press)»

Discussion, reviews of the book Cybersecurity in Intelligent Networking Systems (IEEE Press) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.