Feedback

X
Security and Privacy in Networks and Multimedia

Security and Privacy in Networks and Multimedia

0 Ungluers have Faved this Work
The rapid advancement of technology necessitates the development of innovative solutions that maintain robust security and privacy across data networks and multimedia systems. This collection aims to advance the state of the art in network and multimedia security, offering innovative solutions to pressing challenges and contributing significantly to the security of our increasingly digital world. Key topics include resilient forecasting networks for smart cities, integrating collective intelligence predictors that mitigate cyberattack impacts, and comprehensive security measures for supply chains utilizing machine learning and blockchain technologies. This Special Issue also explores advanced detection methods, such as jamming detection in next-generation communication systems and format-preserving encryption for network layer privacy protection. Intrusion detection and AI-enhanced security feature prominently, with the methods presented including semi-supervised alert filtering and the Improved Sine Cosine Algorithm with deep learning for anomaly detection. Generative approaches, such as the SPE-ACGAN method, address class imbalance in network intrusion detection systems, while end-verifiable key frameworks enhance IoT security. This Special Issue also covers explainable security solutions, such as the detection of evasive malicious PDFs using ensemble learning, and advanced cryptographic techniques, including radio frequency fingerprinting for smart grid security and hierarchical key management for wireless sensor networks in medical environments.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 0 times via unglue.it ebook links.
  1. 0 - pdf (CC BY-NC-ND) at Unglue.it.

Keywords

  • 5G
  • alert fatigue
  • artificial intelligence
  • attack mitigation
  • blockchain
  • bloom
  • bus-off attack
  • CAN attack detection
  • CAN attack response
  • cipher-block chaining (CBC)
  • Cloud computing
  • controller area network (CAN)
  • cyber security
  • cybersecurity
  • deep learning
  • electricity load forecasting
  • ensemble learning
  • EVM
  • explainable machine learning
  • false positive
  • feature engineering
  • feature selection
  • format-preserving encryption
  • generative adversarial network
  • HEED protocol
  • heterogeneous WSN
  • imbalanced dataset
  • imbalanced network traffic
  • Internet of Things
  • intrusion detection
  • intrusion detection system
  • jamming detection
  • key management
  • Machine learning
  • malicious content injection
  • malicious PDF detection
  • n/a
  • network intrusion detection system
  • network privacy
  • PDF malware
  • PRNG
  • programmable networks
  • prototype clustering
  • radio frequency fingerprinting
  • resampling method
  • resource block
  • reverse mimicry attack
  • rivest-cipher5 (RC5)
  • RSA
  • security
  • security monitoring
  • semi-supervised learning
  • shapely additive explanation
  • Smart city
  • Smart grid
  • software-defined radio
  • supply chain systems
  • support vector machine
  • unsupervised learning
  • Validation
  • Wireless sensor networks
  • WSNs

Links

DOI: 10.3390/books978-3-7258-1862-4

Editions

edition cover

Share

Copy/paste this into your site: