Browse Results

Showing 3,801 through 3,825 of 17,279 results

Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and Applications

by Huadong Mo Giovanni Sansavini Min Xie

CYBER-PHYSICAL DISTRIBUTED SYSTEMS Gather detailed knowledge and insights into cyber-physical systems behaviors from a cutting-edge reference written by leading voices in the field In Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and Applications, distinguished researchers and authors Drs. Huadong Mo, Giovanni Sansavini, and Min Xie deliver a detailed exploration of the modeling and reliability analysis of cyber physical systems through applications in infrastructure and energy and power systems. The book focuses on the integrated modeling of systems that bring together physical and cyber elements and analyzing their stochastic behaviors and reliability with a view to controlling and managing them. The book offers a comprehensive treatment on the aging process and corresponding online maintenance, networked degradation, and cyber-attacks occurring in cyber-physical systems. The authors include many illustrative examples and case studies based on real-world systems and offer readers a rich set of references for further research and study. Cyber-Physical Distributed Systems covers recent advances in combinatorial models and algorithms for cyber-physical systems modeling and analysis. The book also includes: A general introduction to traditional physical/cyber systems, and the challenges, research trends, and opportunities for real cyber-physical systems applications that general readers will find interesting and useful Discussions of general modeling, assessment, verification, and optimization of industrial cyber-physical systems Explorations of stability analysis and enhancement of cyber-physical systems, including the integration of physical systems and open communication networks A detailed treatment of a system-of-systems framework for the reliability analysis and optimal maintenance of distributed systems with aging components Perfect for undergraduate and graduate students in computer science, electrical engineering, cyber security, industrial and system engineering departments, Cyber-Physical Distributed Systems will also earn a place on the bookshelves of students taking courses related to reliability, risk and control engineering from a system perspective. Reliability, safety and industrial control professionals will also benefit greatly from this book.

Cyber-Physical Energy and Power Systems: Modeling, Analysis and Application

by Yijia Cao Yong Li Xuan Liu Christian Rehtanz

This book discusses recent advances in cyber-physical power systems (CPPS) in the modeling, analysis and applications of smart grid. It introduces a series of models, such as an analysis of interaction between the power grid and the communication network, differential protection in smart distribution systems, data flow for VLAN-based communication in substations, a co-simulation model for investigating the impacts of cyber-contingency and distributed control systems as well as the analytical techniques used in different parts of cyber physical energy systems. It also discusses methods of cyber-attack on power systems, particularly false data injection. The results presented are a comprehensive summary of the authors’ original research conducted over a period of 5 years. The book is of interest to university researchers, R&D engineers and graduate students in power and energy systems.

Cyber Security: Power and Technology (Intelligent Systems, Control and Automation: Science and Engineering #93)

by Pekka Neittaanmäki Martti Lehto

This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.

Cyber Security

by John G. Voeller

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (Lecture Notes on Data Engineering and Communications Technologies #73)

by Kavita Khanna Vania Vieira Estrela Joel José Puga Coelho Rodrigues

This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3–4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.

Cyber Security and Digital Forensics: Select Proceedings of the International Conference, ReDCySec 2023 (Lecture Notes in Networks and Systems #896)

by Nihar Ranjan Roy Sudeep Tanwar Usha Batra

The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry.

Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Lecture Notes in Computer Science #10332)

by Shlomi Dolev Sachin Lodha

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.

Cyber Security in India: Education, Research and Training (IITK Directions #4)

by Sandeep Kumar Shukla Manindra Agrawal

This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur's Computer Science and Engineering Department established an ‘Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3I Center)’ in 2016 with funding from the Science and Engineering Research Board (SERB), and other funding agencies. The work at the center focuses on smart grid security, manufacturing and other industrial control system security; network, web and data security; cryptography, and penetration techniques. The founders are involved with various Indian government agencies including the Reserve Bank of India, National Critical Information Infrastructure Protection Center, UIDAI, CCTNS under home ministry, Ministry of IT and Electronics, and Department of Science & Technology. The center also testifies to the parliamentary standing committee on cyber security, and has been working with the National Cyber Security Coordinator's office in India. Providing glimpses of the work done at IIT Kanpur, and including perspectives from other Indian institutes where work on cyber security is starting to take shape, the book is a valuable resource for researchers and professionals, as well as educationists and policymakers.

Cyber Security: The Lifeline of Information and Communication Technology (Springer Series in Wireless Technology)

by Ramjee Prasad Vandana Rohokale

This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are growing exponentially. This book discusses a variety of problems and solutions including: • Internet of things and Machine to Machine Communication; • Infected networks such as Botnets; • Social media and networking; • Cyber Security for Smart Devices and Smart Grid • Blockchain Technology and • Artificial Intelligence for Cyber Security Given its scope, the book offers a valuable asset for cyber security researchers, as well as industry professionals, academics, and students.

Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 (Lecture Notes in Networks and Systems #370)

by Dharma P. Agrawal Nadia Nedjah B. B. Gupta Gregorio Martinez Perez

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

Cyber Technologies and Emerging Sciences: ICCTES 2021 (Lecture Notes in Networks and Systems #467)

by Sudhanshu Maurya Sateesh K. Peddoju Badlishah Ahmad Ines Chihi

The book is a collection of best selected research papers presented at International Conference on Cyber-Technologies and Emerging Sciences (ICCTES 2021), organized by Graphic Era Hill University, Bhimtal Campus, Uttarakhand, India, during 17 – 18 December 2021. The book covers state-of-the-art applications, innovative methods, and analyze the unexplored and unsolved challenges to establish the relative solutions to advance the existing applications and theories of Cyber-Technologies and Emerging Sciences.

Cyber-Threats to Canadian Democracy (McGill-Queen's/Brian Mulroney Institute of Government Studies in Leadership, Public Policy, and Governance)

by Holly Ann Garnett and Michael Pal

From the Cambridge Analytica scandal to overloaded internet voting servers to faulty voting machines, the growing relationship between democracy and technology has brought to light the challenges associated with integrating new digital tools into the electoral system. Canadian politics has also felt the impact of this migration online.This timely book presents the first comprehensive study of the various cyber-threats to election integrity across Canadian jurisdictions. Scrutinizing the events of the 2019 federal election, Cyber-Threats to Canadian Democracy examines how new technologies have affected the practice of electoral politics and what we can do to strengthen future Canadian elections. Through the disciplines of political science, law, computer science, engineering, communications, and others, chapters shed light on some of the most contentious issues around technology and electoral integrity. The contributors address current domestic and foreign threats to Canadian elections, evaluate the behaviour of actors ranging from political parties and interest groups to policymakers and election administrators, and assess emerging legal and regulatory responses while anticipating future challenges to the quality of elections in Canada and around the globe.Cyber-Threats to Canadian Democracy helps seed the study of digital technology’s security risks, providing insight into what reforms are needed and evaluating existing legal and policy frameworks in light of these threats.

Cyberactivism on the Participatory Web (Routledge Studies in New Media and Cyberculture)

by Martha McCaughey

Cyberactivism already has a rich history, but over the past decade the participatory web—with its de-centralized information/media sharing, portability, storage capacity, and user-generated content—has reshaped political and social change. Cyberactivism on the Participatory Web examines the impact of these new technologies on political organizing and protest across the political spectrum, from the Arab Spring to artists to far-right groups. Linking new information and communication technologies to possibilities for solidarity and action—as well as surveillance and control—in a context of global capital flow, war, and environmental crisis, the contributors to this volume provide nuanced analyses of the dramatic transformations in media, citizenship, and social movements taking place today.

Cyberhate in the Context of Migrations (Postdisciplinary Studies in Discourse)

by Angeliki Monnier Axel Boursier Annabelle Seoane

This edited book takes an interdisciplinary approach to shed light on the complex dynamics involved in the incidence of online hate speech against migrants in user-generated contexts. The authors draw on case studies from Finland, France, Germany, Italy, Poland and the UK, bringing together qualitative and quantitative analyses on user-generated online comments. The authors argue that online hate speech against migrants must be understood as a symptom of a representation crisis on migration, which can only be fully perceived through the study of the complex linguistic, interactional and connective processes within which it emerges. They focus on representations and shared meanings, community building and otherness, and delve into the role of network ecosystems in the process of the construction of public problems. This book will be of interest to undergraduate and post-graduate students as well as academics working on hate speech and migration studies in a variety of fields, and can also contribute to improving research protocols for automated analyses and detections of online hate speech.

Cybernetics of Art: Reason and the Rainbow (Routledge Revivals)

by M. J. Rosenberg

First published in 1983, Cybernetics of Art uses the methodology and concepts of cybernetics to explore art and the creative process. Part I surveys the domain that includes both science and the arts, attempting to understand their differing viewpoints- and the basis of conflicts between them. Art is approached as a method of knowledge aimed at knowledge of experience per se (as distinct from knowledge derived through experience).Part II poses the problem of notionally constructing an authorship machine and develops the technical argument by exploring the question of the kind of machine it would need to be. Part III examines the products of such a machine with a view to finding criteria for distinguishing those that might be called art. An extended, non-technical commentary accompanies the text throughout, with the dual aim of comparing the book’s technical conclusions with ideas expressed by critiques and practicing artists and assisting readers unfamiliar with the information sciences in following the argument. In a world dominated by artificial intelligence, this interdisciplinary book will be useful for scholars and researchers of cybernetics, art, and humanities and social sciences in general.

Cybersecurity and Identity Access Management

by Bharat S. Rawal Gunasekaran Manogaran Alexender Peter

This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.

Cybersecurity Discourse in the United States: Cyber-Doom Rhetoric and Beyond (Routledge Studies in Conflict, Security and Technology)

by Sean T. Lawson

This book examines the role of cyber-doom rhetoric in the U.S. cybersecurity debate.For more than two decades, fear of "cyber-doom" scenarios—i.e. cyberattacks against critical infrastructure resulting in catastrophic physical, social, and economic impacts—has been a persistent feature of the U.S. cybersecurity debate. This is despite the fact that no cyberattack has come close to realizing such impacts. This book argues that such scenarios are part of a broader rhetoric of cyber-doom within the U.S. cybersecurity debate, and takes a multidisciplinary approach that draws on research in history, sociology, communication, psychology, and political science. It identifies a number of variations of cyber-doom rhetoric, then places them into a larger historical context, assesses how realistic the fears expressed in such rhetoric are, and finally draws out the policy implications of relying on these fears to structure our response to cybersecurity challenges. The United States faces very real cybersecurity challenges that are, nonetheless, much less dramatic than what is implied in the rhetoric. This book argues that relying on cyber-doom rhetoric to frame our thinking about such threats is counterproductive, and encourages us to develop ways of thinking and speaking about cybersecurity beyond cyber-doom.This book will be of much interest to students of cybersecurity, foreign policy, public administration, national security, and international relations in general.

Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing (Springer Series in Advanced Manufacturing)

by Dirk Schaefer Lane Thames

This book introduces readers to cybersecurity and its impact on the realization of the Industry 4. 0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4. 0 landscape and details the existing cybersecurity threats faced by Industry 4. 0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4. 0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4. 0 and cybersecurity.

Cybersecurity of Industrial Systems

by Jean-Marie Flaus

How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions. Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. The book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems.

Cybersecurity Vigilance and Security Engineering of Internet of Everything (Internet of Things)

by Kashif Naseer Qureshi Thomas Newe Gwanggil Jeon Abdellah Chehri

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms.

The Cyberspace Handbook

by Jason Whittaker

The Cyberspace Handbook is a comprehensive guide to all aspects of new media, information technologies and the internet. It gives an overview of the economic, political, social and cultural contexts of cyberspace, and provides practical advice on using new technologies for research, communication and publication. The Cyberspace Handbook includes: *a glossary of over eighty key terms*a list of over ninety web resources for news and entertainment, new media and web development, education and reference, and internet and web information* specialist chapters on web design and journalism and writing on the web*Over thirty illustrations of internet material and software applications.Jason Whittaker explores how cyberspace has been constructed, how it is used and extends into areas as different as providing us immediate news or immersive games and virtual technologies for areas such as copyright and cybercrime, as well as key skills in employing the internet for research or writing and designing for the Web.

Cybertheology: Thinking Christianity in the Era of the Internet

by Maria Way Antonio Spadaro

Because the Internet has changed and is changing the ways in which we think and act, it must also be changing the ways in which we think Christianity and its theology. Cybertheology is the first book to explore this process from a Catholic point of view. Drawing on the theoretical work of authors such as Marshall McLuhan, Peter Levy, and Teilhard de Chardin, it questions how technologies redefine not only the ways in which we do things but also our being and therefore the way we perceive reality, the world, others, and God. “Does the digital revolution affect faith in any sense?” Spadaro asks. His answer is an emphatic Yes. But how, then, are we to live well in the age of the Internet? Spadaro delves deeply into various dimensions of the impact of the Net on the Church and its organization, on our understanding of revelation, grace, liturgy, the sacraments, and other classical theological themes. He rightly points out that the digital environment is not merely an external instrument that facilitates human communication or a purely virtual world, but part of the daily experience of many people, a new “anthropological space” that is reshaping the way we think, know, and express ourselves. Naturally, this calls for a new understanding of faith so that it makes sense to people who live and work in the digital media environment. In developing the notion of cybertheology, Spadaro seeks to propose an intelligence of faith (intellectus fidei) in the era of the Internet. The book’s chapters include reflections on man the decoder and the search engines of God, networked existence and the mystical body, hacker ethics and Christian vision, sacraments and “virtual presence,” and the theological challenges of collective intelligence.

Cyberwar: How Russia Helped Elect Trump

by Kathleen Hall Jamieson

The question of how Donald Trump won the 2016 election looms over his presidency. In particular, were the 78,000 voters who gave him an Electoral College victory affected by the Russian trolls and hackers? Trump has denied it. So has Vladimir Putin. Others cast the answer as unknowable. In Cyberwar, Kathleen Hall Jamieson marshals the troll posts, unique polling data, analyses of how the press used hacked content, and a synthesis of half a century of media effects literature to argue that, although not certain, it is probable that the Russians helped elect the 45th president of the United States. In the process, she asks: How extensive was the troll messaging? What characteristics of social media did the Russians exploit? Why did the mainstream press rush the hacked content into the citizenry's newsfeeds? Was Clinton telling the truth when she alleged that the debate moderators distorted what she said in the leaked speeches? Did the Russian influence extend beyond social media and news to alter the behavior of FBI director James Comey? After detailing the ways in which Russian efforts were abetted by the press, social media, candidates, party leaders, and a polarized public, Cyberwar closes with a warning: the country is ill-prepared to prevent a sequel. In this updated paperback edition, Jamieson covers the many new developments that have come to light since the original publication.

The Cyborg Subject

by Garfield Benjamin

This book outlines a new conception of the cyborg in terms of consciousness as the parallax gap between physical and digital worlds. The contemporary subject constructs its own internal reality in the interplay of the Virtual and the Real. Reinterpreting the work of Slavoj Žižek and Gilles Deleuze in terms of the psychological and ontological construction of the digital, alongside the philosophy of quantum physics, this book offers a challenge to materialist perspectives in the fluid cyberspace that is ever permeating our lives. The inclusion of the subject in its own epistemological framework establishes a model for an engaged spectatorship of reality. Through the analysis of online media, digital art, avatars, computer games and science fiction, a new model of cyborg culture reveals the opportunities for critical and creative interventions in the contemporary subjective experience, promoting an awareness of the parallax position we all occupy between physical and digital worlds.

Cycles of Spin: Strategic Communication in the U. S Congress

by Patrick Sellers

How do politicians try to shape their news coverage? Sellers examines strategic communication campaigns in the U.S. Congress. He argues that these campaigns create cycles of spin: leaders create messages, rank-and-file legislators decide whether to promote those messages, journalists decide whether to cover the messages, and any coverage feeds back to influence the policy process. These four stages are closely related; decisions at one stage influence those at another. Sellers uses diverse evidence, from participant observation and press secretary interviews, to computerized content analysis and vector auto regression. The result is a comprehensive and unprecedented examination of politicians' promotional campaigns and journalists' coverage of those campaigns. Countering numerous critics of spin, Sellers offers the provocative argument that the promotional messages have their origins in the actual policy preferences of members of Congress. The campaigns to promote these messages thus can help the public learn about policy debates in Congress.

Refine Search

Showing 3,801 through 3,825 of 17,279 results