Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
The book gives a comprehensive overview of the evolving landscape of cyber-physical systems (CPS) with a primary focus on security challenges and innovative solutions. CPS, encompassing a wide array of applications from e-Health to smart grid and industry automation, is explored in depth through eight edited reviews.
The book starts with an exploration of various threat detection and prevention techniques in IoT environments, followed by discussions on security in smart grid cyber-physical systems, and the integration of cyber-physical systems with game theory. It also covers important topics such as cyber-physical systems in healthcare, augmented reality challenges, network and computer forensic frameworks, and a review of industrial critical infrastructure perspectives.
The journey from traditional data warehouses to data lakes is thoroughly examined, shedding light on the evolution of data storage methods. The final chapter explains intrusion detection in industrial critical infrastructure, reviewing feature selection and classification models. By navigating through these topics, the book equips readers with a comprehensive understanding of cybersecurity challenges and solutions in an era of automation and IoT technologies.
This book is intended for a diverse readership, including professionals, researchers, and technology enthusiasts keen on exploring the intricacies of CPS, IoT security, data storage evolution, and industrial infrastructure protection.
Key Features
Analytical insights into cyber-physical systems security.
Thorough exploration of threat detection and prevention techniques.
Application-focused chapters covering smart grid, healthcare, and more.
Integration of game theory and augmented reality in cyber-physical systems.
Comprehensive overview on network and computer forensic frameworks.
Preface
Advanced Cybersecurity Tools and Techniques
Advanced Forensics Open-Source Tools
Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques
IoT Forensics
Big Data Forensics: Challenges and Approaches
Drone Forensics
Ransomware Attacks on IoT Devices
A Critical Analysis of Privacy Implications Surrounding Alexa and Voice Assistants
Zeus: In-Depth Malware Analysis of Banking Trojan Malware
Villain: Malware Analysis and Antivirus Evasion of a Backdoor Generator
An Investigation of Memory Forensics in Kernel Data Structure
Analysis and Impacts of Avast Antivirus Vulnerabilities
How to Recover Deleted Data from SSD Drives after TRIM
Early Validation of Investigation Process Model
Dark Web Forensics