7 Chapter 8Figure 8.1 Various compression techniques.Figure 8.2 PSNR vs. threshold for image at decomposition level = 16.Figure 8.3 PSNR vs. threshold for image at decomposition level = 4.
8 Chapter 9Figure 9.1 Cellular infrastructure revenue forecast, Worldwide, 2018–2021 (Milli...Figure 9.2 Key enabling techniques for 5G.Figure 9.3 Components of 5G green network (5G-GN).Figure 9.4 Overview of 5G security architecture (source: 5G America White paper ...
9 Chapter 10Figure 10.1 Virtual architecture of the proposed architecture.Figure 10.2 Entire framework price in INR taking in upholding for first year bet...
10 Chapter 11Figure 11.1 Big data processing.Figure 11.2 10 V’s of big data.Figure 11.3 Big data technology process.Figure 11.4 Architecture of big data.Figure 11.5 Big data access control.Figure 11.6 Classifications of big data.Figure 11.7 Performance factors.Figure 11.8 Big data security and privacy areas.Figure 11.9 Big data security and privacy issue.Figure 11.10 Big data security threats.Figure 11.11 Process flow of the proposed work.Figure 11.12 Comparative analysis of time taken.Figure 11.13 Comparative analysis of error rate.Figure 11.14 Comparative analysis of packet size.Figure 11.15 Comparative analysis of security mechanism.
1 Cover
2 Table of Contents
3 Title Page
4 Copyright
5 Dedication
6 Preface
7 Acknowledgment
8 Begin Reading
9 About the Editors
10 Index
11 Also of Interest
12 End User License Agreement
1 vii
2 ii
3 iii
4 iv
5 v
6 xv
7 xvi
8 xvii
9 xviii
10 xix
11 xx
12 xxi
13 xxiii
14 xxiv
15 1
16 2
17 3
18 4
19 5
20 6
21 7
22 8
23 9
24 10
25 11
26 12
27 13
28 14
29 15
30 16
31 17
32 18
33 19
34 20
35 21
36 22
37 23
38 24
39 25
40 26
41 27
42 28
43 29
44 30
45 31
46 32
47 33
48 34
49 35
50 36
51 37
52 38
53 39
54 40
55 41
56 42
57 43
58 44
59 45
60 47
61 48
62 49
63 50
64 51
65 52
66 53
67 54
68 55
69 56
70 57
71 58
72 59
73 60
74 61
75 62
76 63
77 64
78 65
79 66
80 67
81 68
82 69
83 71
84 72
85 73
86 74
87 75
88 76
89 77
90 78
91 79
92 80
93 81
94 82
95 83
96 84
97 85
98 86
99 87
100 88
101 89
102 90
103 91
104 92
105 93
106 94
107 95
108 96
109 97
110 98
111 99
112 100
113 101
114 102
115 103
116 104
117 105
118 106
119 107
120 108
121 109
122 110
123 111
124 112
125 113
126 114
127 115
128 116
129 117
130 118
131 119
132 120
133 121
134 122
135 123
136 124
137 125
138 126
139 127
140 129
141 130
142 131
143 132
144 133
145 134
146 135
147 136
148 137
149 138
150 139
151 140
152 141
153 142
154 143
155 144
156 145
157 146
158 147
159 148
160 149
161 150
162 151
163 152
164 153
165 154
166 155
167 157
168 158
169 159
170 160
171 161
172 162
173 163
174 164
175 165
176 166
177 167
178 168
179 169
180 170
181 171
182 172
183 173
184 174
185 175
186 176
187 177
188 178
189 179
190 180
191 181
192 182
193 183
194 184
195 185
196 186
197 187
198 188
199 189
200 190
201 191
202 193
203 194
204 195
205 196
206 197
207 198
208 199
209 200
210 201
211 202
212 203
213 204
214 205
215 206
216 207
217 208
218 209
219 210
220 211
221 212
222 213
223 214
224 215
225 216
226 217
227 218
228 219
229 220
230 221
231 222
232 223
233 224
234 225
235 226
236 227
237 228
238 229
239 230
240 231
241 232
242 233
243 234
244 235
245 236
246 237
247 238
248 239
249 240
250 241
251 242
252 243
253 244
254 245
255 246
256 247
257 248
258 249
259 250
260 251
261 252
262 253
263 254
264 255
265 256
266 257
267 258
268 259
269 260
270 261
271 262
272 263
273 264
274 265
275 266
276 267
277 269
278 270
279 271
280 272
281 273
282 274
283 275
284 276
285 277
286 278
287 279
288 280
289 281
290 283
291 284
292 285
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Advances in Cyber Security
Series Editors: Rashmi Agrawal and D. Ganesh Gopal
Scope:The purpose of this book series is to present books that are specifically designed to address the critical security challenges in today’s computing world including cloud and mobile environments and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography, blockchain and other defense mechanisms. The book series presents some of the state-of-the-art research work in the field of blockchain, cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of blockchain, cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities. The book series provides a comprehensive look at the various facets of cloud security: infrastructure, network, services, compliance and users. It will provide real-world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective. The book series will serve as a platform for books dealing with security concerns of decentralized applications (DApps) and smart contracts that operate on an open blockchain. The book series will be a comprehensive and up-to-date reference on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.
Publishers at Scrivener Martin Scrivener (martin@scrivenerpublishing.com) Phillip Carmical (pcarmical@scrivenerpublishing.com)
Cyber Security and Network Security
Edited by
Sabyasachi Pramanik
Debabrata Samanta
M. Vinay
and
Abhijit Guha
This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA © 2022 Scrivener Publishing LLC
Читать дальше