Next-generation systems and secure computing

Next-Generation Systems and Secure Computing is essential for anyone looking to stay ahead in the rapidly evolving landscape of technology. It offers crucial insights into advanced computing models and their security implications, equipping readers with the knowledge needed to navigate the complex c...

Full description

Saved in:
Bibliographic Details
Other Authors Barman, Subhabrata (Editor), Koley, Santanu (Editor), Joardar, Subhankar (Editor)
Format Electronic eBook
LanguageEnglish
Published Hoboken, NJ : Beverly, MA : John Wiley & Sons, Inc. ; Scrivener Publishing LLC, 2025.
Subjects
Online AccessFull text
ISBN9781394228522
9781394228546
9781394228478
9781394228263
Physical Description1 online zdroj

Cover

LEADER 00000cam a2200000 i 4500
001 115248
003 CZ-ZlUTB
005 20260227141626.0
006 m o d
007 cr cnu---unuuu
008 250313t20252025nju o 000 0 eng d
040 |a YDX  |b eng  |e rda  |c YDX  |d YDX  |d OCLCO  |d DG1  |d ORMDA  |d UKKRT  |d CLOUD  |d EBLCP  |d UKAHL  |d UKMGB  |d HOPLA  |d N$T 
020 |a 9781394228522  |q (electronic book) 
020 |a 9781394228546  |q (electronic book) 
020 |a 9781394228478  |q (electronic bk.) 
020 |z 9781394228263  |q (hardcover) 
024 8 |a CIPO000218272 
035 |a (OCoLC)1506323339  |z (OCoLC)1505951848  |z (OCoLC)1518929404 
245 0 0 |a Next-generation systems and secure computing /  |c edited by Subhabrata Barman, Santanu Koley, and Subhankar Joardar. 
264 1 |a Hoboken, NJ :  |b John Wiley & Sons, Inc. ;  |a Beverly, MA :  |b Scrivener Publishing LLC,  |c 2025. 
264 4 |c ©2025 
300 |a 1 online zdroj 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
588 |a Description based on online resource; title from digital title page (viewed on March 28, 2025). 
520 |a Next-Generation Systems and Secure Computing is essential for anyone looking to stay ahead in the rapidly evolving landscape of technology. It offers crucial insights into advanced computing models and their security implications, equipping readers with the knowledge needed to navigate the complex challenges of today's digital world. The development of technology in recent years has produced a number of scientific advancements in sectors like computer science. The advent of new computing models has been one particular development within this sector. New paradigms are always being invented, greatly expanding cloud computing technology. Fog, edge, and serverless computing are examples of these revolutionary advanced technologies. Nevertheless, these new approaches create new security difficulties and are forcing experts to reassess their current security procedures. Devices for edge computing aren't designed with the same IT hardware protocols in mind. There are several application cases for edge computing and the Internet of Things (IoT) in remote locations. Yet, cybersecurity settings and software upgrades are commonly disregarded when it comes to preventing cybercrime and guaranteeing data privacy. Next-Generation Systems and Secure Computing compiles cutting-edge studies on the development of cutting-edge computing technologies and their role in enhancing current security practices. The book will highlight topics like fault tolerance, federated cloud security, and serverless computing, as well as security issues surrounding edge computing in this context, offering a thorough discussion of the guiding principles, operating procedures, applications, and unexplored areas of study. Next-Generation Systems and Secure Computing is a one-stop resource for learning about the technology, procedures, and individuals involved in next-generation security and computing. 
504 |a Obsahuje bibliografické odkazy a index. 
505 0 |a Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Yet Another Move Towards Securing Video Using Sudoku-Fernet -- 1.1 Introduction -- 1.2 Literature Survey -- 1.3 Proposed Methodology -- 1.3.1 Proposed Algorithm for Generating Sudoku-Fernet Cipher Key -- 1.3.2 Encryption Process -- 1.4 Result Analysis -- 1.5 Computational Complexity -- 1.6 Conclusions -- References -- Chapter 2 Watermarking: Characteristics, Methods, and Evaluation -- 2.1 Introduction -- 2.1.1 Chapter Organization -- 2.2 Watermark Definition -- 2.2.1 Digital Watermarking Applications 
505 8 |a 2.2.1.1 Copyright Protection -- 2.2.1.2 Fingerprinting -- 2.2.1.3 Broadcast Monitoring -- 2.2.1.4 Tamper Proofing -- 2.3 Properties of Watermarking -- 2.4 Categorization of Watermarking -- 2.4.1 Related Works on Watermarking -- 2.5 Attacks on Watermarking -- 2.5.1 Enhancement Technique Attacks -- 2.5.2 Noise Addition Attacks -- 2.5.3 Geometric Transformation Attacks -- 2.5.4 Compression Attack -- 2.5.5 Combinational Attacks -- 2.6 Chapter Summary -- References -- Chapter 3 A Comprehensive Study on Deep Learning and Artificial Intelligence for Malware Analysis -- 3.1 Introduction 
505 8 |a 3.2 The Evolving Landscape of Malware Threats -- 3.2.1 Polymorphic and Metamorphic Malware -- 3.2.2 Advanced Persistent Threats (APTs) -- 3.2.3 Fileless and Memory-Based Attacks -- 3.2.4 Ransomware and Cryptojacking -- 3.2.5 Supply Chain Attacks -- 3.2.6 IoT and Mobile Malware -- 3.2.7 Zero-Day Exploits -- 3.3 The Role of Deep Learning and AI in Enhancing Cybersecurity -- 3.3.1 Advanced Threat Detection -- 3.3.2 Real-Time Response and Mitigation -- 3.3.3 Behavioral Analysis -- 3.3.4 Anomaly Detection -- 3.3.5 Predictive Security -- 3.3.6 Reducing False Positives 
505 8 |a 3.3.7 Continuous Learning and Improvement -- 3.4 Deep Learning Models for Malware Analysis -- 3.4.1 Convolutional Neural Networks (CNNs) -- 3.4.2 Recurrent Neural Networks (RNNs) for Malware Analysis -- 3.4.3 Long Short-Term Memory Networks (LSTMs) -- 3.4.4 Generative Adversarial Networks (GANs) -- 3.4.5 Radial Basis Function Networks (RBFNs) -- 3.4.6 Deep Belief Networks (DBNs) -- 3.5 AI Techniques in Malware Analysis -- 3.5.1 Unsupervised Learning -- 3.5.2 Supervised Learning -- 3.5.3 Deep Learning -- 3.6 Challenges and Limitations in Malware Family Classification -- 3.6.1 Lack of Labeled Data 
505 8 |a 3.6.2 Imbalanced Data -- 3.6.3 Feature Engineering -- 3.6.4 Adversarial Attacks -- 3.6.5 Generalization to New Variants -- 3.6.6 Real-Time Analysis -- 3.6.7 Interpretability -- 3.6.8 False Positives and False Negatives -- 3.6.9 Overfitting -- 3.7 Future Directions -- 3.7.1 Conclusion -- References -- Chapter 4 Transmit Texts Covertly Using Trigonometric Functions and Pythagorean Theorem -- 4.1 Introduction -- 4.2 Mainstream Definition -- 4.2.1 Plain Text -- 4.2.2 Cipher Text -- 4.2.3 Cipher -- 4.2.4 Encryption -- 4.2.5 Decryption -- 4.2.6 Trigonometric Functions -- 4.2.7 Pythagorean Theorem 
650 0 |a Computer security. 
650 0 |a Cloud computing  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Barman, Subhabrata,  |e editor. 
700 1 |a Koley, Santanu,  |e editor. 
700 1 |a Joardar, Subhankar,  |e editor. 
776 0 8 |i Print version:  |z 1394228260  |z 9781394228263  |w (OCoLC)1422141778 
776 0 8 |i Print version:  |z 9781394228263 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522 
992 |c EBOOK-TN  |c WILEY 
993 |x NEPOSILAT  |y EIZ 
999 |c 115248  |d 115248