Read more
This book addresses significant issues in the cloud and the Internet of Things including personal information and identity crime for cloud of things, intellectual property-related issues in cyberspace, computer forensic investigation in cloud of things, hacking, cyber-terrorism, and intrusion detection.
List of contents
Part 1: Cyber-Physical Systems: Vulnerabilities, Attacks, and Threats. 1. Improving Security and Privacy in Cyber-Physical Systems. 2. Vulnerability Analysis for Cyber-Physical Systems. 3. State Estimation-Based Attack Detection in Cyber-Physical Systems: Limitations and Solutions. Part 2: Security and Privacy in Cloud and Embedded Systems for Cyber-Physical Systems. 4. Towards Secure Software-Defined Networking Integrated Cyber-Physical Systems: Attacks and Countermeasures. 5. DDoS Defense in SDN-Based Cyber-Physical Cloud. 6. Detecting Pilot Contamination Attacks in Wireless Cyber-Physical Systems. 7. Laboratory Exercises to Accompany Industrial Control and Embedded Systems Security Curriculum Modules. Part 3: Security and Privacy in Big Data Cyber-Physical Systems. 8. Security and Privacy in Big Data Cyber-Physical Systems. 9. Big Data Technologies–Supported Generic Visualization System in an Enterprise Cyber-Physical Environment. 10. Searching for IoT Resources in Intelligent Transportation Cyberspace (T-CPS): Requirements, Use-Cases and Security Aspects. 11. Evaluating the Reliability of Digital Forensics Tools for Cyber-Physical Systems. 12. Point-of-Sale Device Attacks and Mitigation Approaches for Cyber-Physical Systems. 13. Cyber Profiteering in the Cloud of Smart Things.
About the author
Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq
Summary
This book addresses significant issues in the cloud and the Internet of Things including personal information and identity crime for cloud of things, intellectual property-related issues in cyberspace, computer forensic investigation in cloud of things, hacking, cyber-terrorism, and intrusion detection.