Fr. 235.00

Cybersecurity Defensive Walls in Edge Computing

English · Paperback / Softback

Will be released 01.10.2025

Description

Read more










Cybersecurity Defensive Walls in Edge Computing dives into the creation of robust cybersecurity defenses for increasingly vulnerable edge devices. This book examines the unique security challenges of edge environments, including limited resources and potentially untrusted networks, providing fundamental concepts for real-time vulnerability detection and mitigation through novel system architectures, experimental frameworks, and AI/ML techniques. Researchers and industry professionals working in cybersecurity, edge computing, cloud computing, defensive technologies, and threat intelligence will find this to be a valuable resource that illuminates critical aspects of edge-based security to advance theoretical analysis, system design, and practical implementation of defensive walls. With a focus on fast-growing edge application scenarios, this book offers valuable insights into strengthening real-time security for the proliferation of interconnected edge devices.

List of contents










Preface
1. Fundamental concepts of cybersecurity and edge computing
2. Architectural Foundations for Cybersecurity in Edge Computing
3. Advanced adversarial defense mechanisms in edge computing
4. Microsegmentation for containerized microservices in edge computing
5. Extreme Gradient Boosting and Random Forest based Intrusion Detection System
6. Reidentification Risks in Distributed Differentially Private Data Leveraging Large Language Models
7. Cutting-Edge Advances in Edge Computing-assisted Optical Wireless Communications
8. Fortifying the Edge: Zero-Knowledge Proofs for Scalable Block Verification in NEAR Protocol
9. Detection of Hardcoded Login Credentials via Network Function
10. Advancing Cyber Resilience in Edge Computing with Secure Distributed Machine Learning
11. Defensive Walls Against Sophisticated ML-Orchestrated Attacks in Edge Computing
12. Biometric-Based Access Control mechanism for Edge Computing Resources and Services
13. Silent Threat: RAT Attack Strategy and Real Case Analysis in Edge Computing
14. Application of Blockchain for Secured Edge Computing System
15. Support Vector Machines for Enhancing Vulnerability Management and Encryption Protocols in Edge Computing
16. Social and ethical solutions to defeat cyber attacks in edge computing
17. Legal Framework and Regulatory Policies for Cyber-edge Computing Systems

About the author

Agbotiname Lucky Imoize is al Lecturer in the Department of Electrical and Electronics Engineering at the University of Lagos, Nigeria. He was awarded the Fulbright Fellowship as a Visiting Research Scholar at the Wireless@VT Lab in the Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA. He is currently a research scholar at Ruhr University Bochum, Germany, under the Nigerian Petroleum Technology Development Fund (PTDF) and the German Academic Exchange Service (DAAD) through the Nigerian-German Postgraduate Program. He is a Registered Engineer with the Council for the Regulation of Engineering in Nigeria (COREN) and a Nigerian Society of Engineers (NSE) member. He has co-edited two books and coauthored over 90 wireless communication papers in peer-reviewed journals. His research interests are 6G wireless communication, Artificial Intelligence, and the Internet of Things.Mohammad S. Obaidat (Fellow IEEE, Fellow SCS, Fellow AAIA, and Fellow of FTRA) is a Full Professor in the Department of Computer Science at King Abdullah II School of Information Technology (KASIT), University of Jordan, Amman, Jordan. He is also a Distinguished Professor at SRM University, India. He has published around 1,200 technical articles, 100 books, and 70 book chapters. He is Editor-in-Chief of three scholarly journals and an editor of numerous international journals. He is the founding Editor-in-Chief of Wiley Security and Privacy Journal. Moreover, he is the founder or co-founder of five International Conferences. His areas of interest are in wireless networks, cyber security, security of e-Systems, computer networks, data analytics, and computer architecture, parallel computing: Architecture, and Algorithms, and performance evaluation of computer networks and systems.Houbing Song, Security and Optimization for Networked Globe Laboratory, University of Maryland, Baltimore County (UMBC), Baltimore, USA. His research interests include cyber-physical systems, cybersecurity and privacy, IoT, big data analytics, connected vehicles, smart health, wireless communications, and networking. Dr. Song has edited and authored several books in the field, including Cyber-Physical Systems: Foundations, Principles and Applications.Fatos Xhafa, PhD in Computer Science, is Full Professor at the Technical University of Catalonia (UPC), Barcelona, Spain. He has held various tenured and visiting professorship positions. He was a Visiting Professor at the University of Surrey, UK (2019/2020), Visiting Professor at the Birkbeck College, University of London, UK (2009/2010) and a Research Associate at Drexel University, Philadelphia, USA (2004/2005). He was a Distinguished Guest Professor at Hubei University of Technology, China, for the duration of three years (2016-2019). Prof. Xhafa has widely published in peer reviewed international journals, conferences/workshops, book chapters, edited books and proceedings in the field (H-index 55). He has been awarded teaching and research merits by the Spanish Ministry of Science and Education, by IEEE conferences and best paper awards. Prof. Xhafa has an extensive editorial service. He is founder and Editor-In-Chief of Internet of Things - Journal - Elsevier (Scopus and Clarivate WoS Science Citation Index) and of International Journal of Grid and Utility Computing, (Emerging Sources Citation Index), and AE/EB Member of several indexed Int'l Journals. Prof. Xhafa is a member of IEEE Communications Society, IEEE Systems, Man & Cybernetics Society and Founder Member of Emerging Technical Subcommittee of Internet of Things.
His research interests include IoT and Cloud-to-thing continuum computing, massive data processing and collective intelligence, optimization, security and trustworthy computing and machine learning, among others. He can be reached at fatos@cs.upc.edu. Please visit also http://www.cs.upc.edu/~fatos/ and at http://dblp.uni-trier.de/pers/hd/x/Xhafa:Fatos

Product details

Assisted by Agbotiname Lucky Imoize (Editor), Houbing Herbert Song (Editor), Obaidat Mohammad S. (Editor), Xhafa Fatos (Editor of the series)
Publisher Elsevier
 
Languages English
Product format Paperback / Softback
Release 01.10.2025
 
EAN 9780443341090
ISBN 978-0-443-34109-0
Series Intelligent Data-Centric Systems
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Artificial Intelligence, Expert systems / knowledge-based systems, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Artificial Intelligence / Expert Systems

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.