Atnaujinkite slapukų nuostatas

Detecting and Mitigating Robotic Cyber Security Risks [Kietas viršelis]

Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:
Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats.

Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts.
Preface xx
Acknowledgment xxix
Section 1 Basic Concept of Security and Privacy
Chapter 1 A Survey: Vulnerabilities Present in PDF Files
1(11)
Sakshi Gupta
Yogita Gigras
Chapter 2 A Practical Approach of Network Simulation
12(16)
Ratish Agarwal
Piyush Kumar Shukla
Sachin Goyal
Chapter 3 Hindi Optical Character Recognition and Its Applications
28(12)
Rashmi Gupta
Dipti Gupta
Megha Dua
Manju Khari
Chapter 4 Android Permissions: Attacks and Controls
40(11)
Prachi
Arushi Jain
Chapter 5 Distributed System Implementation Based on "Ants Feeding Birds" Algorithm: Electronics Transformation via Animals and Human
51(36)
Preeti Mulay
Krishnal Patel
Hecto Gomez Gauchia
Section 2 Cloud and Mobile Security
Chapter 6 A Survey: Threats and Vulnerabilities in Cloud
87(11)
Srishti Sharma
Yogita Gigras
Chapter 7 Digital Signature Schemes Based on Two Hard Problems
98(28)
A. B. Nimbalkar
C. G. Desai
Chapter 8 Cloud Auditor Loyalty Checking Process Using Dual Signature
126(9)
Divya Thakur
Chapter 9 Cloud Security Using 2-Factor Image Authentication Technique
135(13)
Ratish Agarwal
Anjana Pandey
Mahesh Pawar
Chapter 10 Utilizing Soft Computing Application for QOS and Security Optimization by Meta-Heuristic-Based Genetic Approach
148(12)
Sherin Zafar
Section 3 Cyber Security Concepts
Chapter 11 Cyber Crime and Cyber Security: A Quick Glance
160(12)
Aruna Devi
Chapter 12 Pragmatic Solutions to Cyber Security Threat in Indian Context
172(5)
Cosmena Mahapatra
Chapter 13 Role of Cyber Security in Today's Scenario
177(15)
Manju Khari
Gulshan Shrivastava
Sana Gupta
Rashmi Gupta
Chapter 14 Exploring Cyber Security Vulnerabilities in the Age of IoT
192(16)
Shruti Kohli
Section 4 Robotics Cyber Security Risk
Chapter 15 An Approach towards Survey and Analysis of Cloud Robotics
208(24)
Akash Chowdhury
Swastik Mukherjee
Sourav Banerjee
Chapter 16 Mobile Robotics
232(29)
Isak Karabegovic
Vlatko Dolecek
Chapter 17 Cloud Robotics: Robot Rides on the Cloud - Architecture, Applications, and Challenges
261(14)
K. Saravanan
Chapter 18 Intelligent Agents and Autonomous Robots
275(9)
Deepshikha Bhargava
Chapter 19 Survey of Recent Cyber Security Attacks on Robotic Systems and Their Mitigation Approaches
284(16)
Abdullahi Chowdhury
Gour Karmakar
Joarder Kamruzzaman
Chapter 20 Mobile Agent Communication, Security Concerns, and Approaches: An Insight into Different Kinds of Vulnerabilities a Mobile Agent Could Be Subjected to and Measures to Control Them
300(12)
Kamat Pooja
Gite Shilpa
Patil Shruti
Chapter 21 Cloud and Cyber Security through Crypt-Iris-Based Authentication Approach
312(21)
Sherin Zafar
Chapter 22 Cyber Security Risks in Robotics
333(16)
Ishaani Priyadarshini
Compilation of References 349(26)
About the Contributors 375(7)
Index 382
Raghavendra Kumar, LNCT Group of College, India.

Prasant Kumar Pattnaik, KIIT University, India.

Priyanka Pandey, LNCT Group of College, India.