Ming Yang, Sachi Nandan Mohanty, Suneeta Satpathy, Shu Hu
2025, Springer Cham
This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection.
2025, PURDUE UNIVERSITY PRESS
You just glanced at your phone, didn?t you? That?s exactly how algorithms draw us in. We?re living suspended between two worlds: one where AI quietly decides who gets hired, what news we see, and which voices we hear?and another where millennia of human wisdom sit waiting to guide us. After forty years building AI systems and twenty years studying dharma in Indian ashrams, author Alok R. Chaturvedi learned something crucial: our digital future desperately needs our philosophical past. This isn?t another robot apocalypse book?it is an invitation to see technology through ancient wisdom made urgently relevant as artificial general intelligence approaches. Through deeply human stories?a coder discovering her biases embedded in ?neutral? algorithms, a parent watching their child disappear into endless scrolling?we explore how technology impacts us across three dimensions: Daihik (personal), Daivik (universal), and Bhautik (material). We also examine how technology carries the Three Gunas: Sattvik (clarity), Rajasik (restlessness), and Tamsik (numbness). Additionally, The Dharma of AI introduces the Five Guardians, which are timeless ethical principles: Ahimsa (do no harm), Satya (seek truth), Asteya (take only what?s given), Brahmacharya (consume mindfully), and Dharma (act righteously). Whether building technology, raising children, or seeking authentic digital living, this book offers profound insight and practical wisdom for our most urgent conversation.
Eugene Spafford (Author), Leigh Metcalf (Author), Josiah Dykstra (Author)
2023, Addison-Wesley Professional;
Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn’t the user the weakest link?
Maanak Gupta , Smriti Bhatt , Asma Hassan Alshehri , Ravi Sandhu
2022, Springer Cham
This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS. The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms. This book is designed to serve the computer science and the cybersecurity community including researchers,academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.
Xiaofeng Chen, Willy Susilo, Elisa Bertino
2021, Springer Singapore
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
Hao Zhong, Shimon Y. NofL
2020, Springer Cham
This book focuses on the systematic modeling of complex situations characterized by escalating disruptions, and on cycles of dynamic collaboration for the best handling of disruptions. What can we do about disruptive events and their cascading effects? Thanks to the evolution of intelligent technologies for interaction, communication, sharing, and collaboration, cyberspace is a rapidly expanding world. Our systems of machines, software services, and human organizations have become increasingly interdependent, in other words – networked. As a result, disruptions that initially affect only a small part of any network tend to escalate. At the same time, cyber solutions can support first responders and emergency handlers, enhancing their responsiveness and ability to collaborate with one another in controlling disruptions and preventing their escalation. In this book, we are chiefly interested in how effectively these collaborations can be supported and how we canfurther optimize such support. Solution guidelines for optimizing collaborations are illustrated with examples in various application domains: agricultural robotics, civil cyber-physical infrastructure, visual analytics, manufacturing automation, and supply chains. Open-source simulation tools are also provided to supplement the main content.
Christopher G. Brinton, Mung Chiang
2018, Princeton, New Jersey ; Oxford, England : Princeton University Press
What makes WiFi faster at home than at a coffee shop? How does Google order search results? Is it really true that everyone on Facebook is connected by six steps or less? The Power of Networks answers questions like these for the first time in a way that all of us can understand. Using simple language, analogies, stories, hundreds of illustrations, and no more math than simple addition and multiplication, Christopher Brinton and Mung Chiang provide a smart and accessible introduction to the handful of big ideas that drive the computer networks we use every day. The Power of Networks unifies these ideas through six fundamental principles of networking. These principles explain the difficulties in sharing network resources efficiently, how crowds can be wise or not so wise depending on the nature of their connections, why there are many layers in a network, and more. Along the way, the authors also talk with and share the special insights of renowned experts such as Google’s Eric Schmidt, former Verizon Wireless CEO Dennis Strigl, and “fathers of the Internet” Vint Cerf and Bob Kahn.
2014, Amer Mathematical Society
This book is about the theory and practice of integer factorization presented in a historic perspective. It describes about twenty algorithms for factoring and a dozen other number theory algorithms that support the factoring algorithms. Most algorithms are described both in words and in pseudocode to satisfy both number theorists and computer scientists. Each of the ten chapters begins with a concise summary of its contents.
2011, Shaker Verlag
This work addresses the difficulty to identify space objects in geostationary (GEO) and high eccentricity orbits (HEO) regimes by means of ground based optical observations. The identification is understood here in the widest sense, the aim is to collect information related to an object by investigating all data, which is available via optical observations, including orbit and object properties. Single observation frames are investigated, which contain, apart from the unresolved imaged of space debris objects, stars, hot pixels and so-called cosmic ray events. Cosmic filters operating on the single observation frames are introduced and tested. A new algorithm is introduced and tested to link the possibly many unresolved single object images of unknown newly detected objects in an observation series without apriori information. The accuracy of the Two Une Element (TLE) catalog provided by the US Strategic Command are investigated in GEO and HEO by means of high accuracy optical observations. A new algorithm for catalog correlation has been developed, powerful enough to even correlate observations of GEO objects in clusters. Orbit determination using only very sparse optical observations have been investigated and the prediction accuracy of such orbits are evaluated. The orbital evolution of objects with high area-to-mass ratio has been investigated using a normalized orbit determination setup. Variations in the area-to-mass ratio can be observed. The possibilities for supplementing an orbital element catalogue with light curve measurements are investigated and the light curves of objects with high and low area-to-mass ratio are compared. All algorithms are tested with observations of the ESA Space Debris Telescope (ESASDT), located on Tenerife, Spain, and the Zimmerwald Laser and Astrometry Telescope (ZIMLAT) located close to Bern, Switzerland.
Edited by: Robert W. Proctor; Shimon Y. Nof; Yuehwern Yih, Contributor: Fariborz Farahmand
2011, CRC Press
Cultural factors, in both the narrow sense of different national, racial, and ethnic groups, and in the broader sense of different groups of any type, play major roles in individual and group decisions. Written by an international, interdisciplinary group of experts, Cultural Factors in Systems Design: Decision Making and Action explores innovations in the understanding of how cultural differences influence decision making and action. Reflecting the diverse interests and viewpoints that characterize the current state of decision making and cultural research, the chapter authors represent a variety of disciplines and specialize in areas ranging from basic decision processes of individuals, to decisions made in teams and large organizations, to cultural influences on behavior.
Sorin Adam Matei, Brian Britt
2011, CreateSpace
How do virtual communities come together? What makes them strong? What social theories can be used for explaining them? What rules and policies can be used to make virtual communities last? The book is the product of the Online Interaction Seminar, Purdue University. It includes 2d codes, which facilitate connecting the print version of the book to online resources.
Marcus K. Rogers, John R. Vacca
2011, Chelsea House Pub
James P. Colt (Editor), Marcus K. Rogers (Editor)
2011, Chelsea House Pub
Nathan Fisk and Marcus K. Rogers (editor)
2011, Chelsea House Pub
Samuel Mcquade, Marcus K. Rogers
2011, Chelsea House Pub
Samuel Mcquade, Marcus K. Rogers
2011, Chelsea House Pub
Srikanth Hariharan, Ness B. Shroff, Saurabh Bagchi
2011, LAP LAMBERT Academic Publishing
Wireless ad-hoc networks, especially sensor networks, are increasingly being used for data monitoring in commercial, industrial, and military applications. Security is of great concern from many different viewpoints: ensuring that sensitive data does not fall into wrong hands; ensuring that the received data has not been doctored; and ensuring that the network is resilient to denial of service attacks. This book studies the fundamental problem of secure neighbor discovery, which is critical to protecting the network against a number of different forms of attacks. In wireless ad-hoc and sensor networks, neighbor discovery is one of the first steps performed by a node upon deployment and disrupting it adversely affects a number of routing, MAC, topology discovery and intrusion detection protocols. It is especially harmful when an adversary can convince nodes that it is a legitimate neighbor, which it can do easily and without the use of cryptographic primitives. This book discusses a secure neighbor discovery protocol, SEDINE, for static multihop wireless networks, and extensively analyze its performance.
Samuel Mcquade, Marcus K. Rogers
2011, Chelsea House Pub
E. Bertino, G. Ghinita, A. Kamra
2011, Now Publishers
Today’s organizations rely on database systems as the key data management technology for a large variety of tasks, ranging from day-to-day operations to critical decision making. Such widespread use of database systems make them the main target of many security attacks aimed at corrupting or exfiltrating data outside the organization. On the other hand, data cannot be strictly segregated and need to be readily available for users who have legitimate authorizations to use them. Access Control for Databases - Concepts and Systems provides a comprehensive survey of the foundational models and recent research trends in access control models and mechanisms for database management systems. In addition to surveying the foundational work in the area, it presents extensive case studies covering advanced features of current database management systems, such as the support for fine-grained and context-based access control, the support for mandatory access control, and approaches for protecting the data from insider threats. It also covers novel approaches, based on cryptographic techniques, to enforce access control and surveys access control models for object-databases and XML data. For the reader not familiar with basic notions concerning access control and cryptography, it includes a tutorial presentation on these notions. The discussion is complemented by an analysis of access control functions provided by selected commercial products. It concludes with a discussion on current challenges for database access control and security, and preliminary approaches addressing some of these challenges.
2010, IGI Global
The problems encountered in ensuring that modern computing systems are used appropriately cannot be solved with technology alone, nor can they be addressed independent of the underlying computational fabric. Instead, they require an informed, multidisciplinary approach, especially when considering issues of security, privacy, assurance, and crime.
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives offers insight into social and ethical challenges presented by modern technology. Aimed at students and practitioners in the rapidly growing field of information assurance and security, this book address issues of privacy, access, safety, liability and reliability in a manner that asks readers to think about how the social context is shaping technology and how technology is shaping social context and, in so doing, to rethink conceptual boundaries.
E. Bertino, K. Takahashi
2010, Artech House
Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers an in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding.
Rebecca Herold, Marcus K. Rogers
2010, Auerbach Publications
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity’s information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers.
Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia’s four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource:
Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats.
E. Bertino, L.Martino, A. Squicciarini, F. Paci
2009, Springer
Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with users is ensured if Web services technology is to live up to its promise. However, the very features that make it attractive – such as greater and ubiquitous access to data and other resources, dynamic application configuration and reconfiguration through workflows, and relative autonomy – conflict with conventional security models and mechanisms. Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA. They cover in detail all recent standards that address Web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation, as well as recent research on access control for simple and conversation-based Web services, advanced digital identity management techniques, and access control for Web-based workflows. They explain how these implement means for identification, authentication, and authorization with respect to security aspects such as integrity, confidentiality, and availability.
Xukai Zou, Yuan-Shun Dai, and Yi Pan
2008, World Scientific
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing — one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described.
Xukai Zou, Byrav Ramamurthy, and Spyros S. Magliveras
2005, Springer
This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over data networks. It offers an overview of secure algorithms and protocols for group communication linking areas such as applied cryptography and computer networking. Also included is a coverage of challenges in deploying secure group communication-based applications over wireless networks. These challenges include the limited computational power of mobile devices, susceptibility of wireless networks to intrusion and unauthorized access and mobility of nodes in a wireless ad-hoc network environment. Secure Group Communications Over Data Networks provides a wealth of information for network architects, IT Professionals, computer scientists, and advanced students of computer science and computer engineering in the fields of networking, computer security and software applications development.
Simson Garfinkel, Gene Spafford, Alan Schwartz
2003, O’Reilly Media
This edition of Practical Unix and Internet Security provides detailed coverage of today’s increasingly important security and networking issues. Focusing on the four most popular Unix variants today—Solaris, Mac OS X, Linux, and FreeBSD—this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.
Jaideep Vaidya, Christopher W. Clifton, Yu Michael Zhu
2002, Springer
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a “Data-Mining Moratorium Act” introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense. Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.
James G. Anderson and Kenneth Goodman
2002, Springer Verlag
This book presents 130 case studies illustrating ethical and social issues that arise from the increasing use of computers in medicine, nursing, psychology, pharmacy, and the allied health professions. The rapid development of health informatics offers a rich array of issues and challenges to academics, clinicians, and system developers. These issues involve threats to privacy and confidentiality, misuse of clinical and genetic information, risks to patients of bias and discrimination, erosion of the practitioner-patient relationship, threats to the autonomy of the health professional, and compromises to the quality of care provided. The use of case studies is well known in medicine, nursing, public health, epidemiology, and other health education programs. This book presents selected cases with annotation and commentaries that illustrate ethical concerns and social problems in the use of computers in medicine.
2002, Chapman&Hall/CRC
At the heart of modern cryptographic algorithms lies computational number theory. Whether you’re encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers takes you from basic number theory, through the inner workings of ciphers and protocols, to their strengths and weaknesses.
Simson Garfinkel, Gene Spafford
2001, O’Reilly Media
This much expanded new edition explores web security risks and how to minimize them. Aimed at web users, administrators, and content providers, Web Security, Privacy & Commerce covers cryptography, SSL, the Public Key Infrastructure, digital signatures, digital certificates, privacy threats (cookies, log files, web logs, web bugs), hostile mobile code, and web publishing (intellectual property, P3P, digital payments, client-side digital signatures, code signing, PICS).
