{"title":"A Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service‐Oriented IoT Architecture","authors":"A. Bang, U. P. Rao, Amit A. Bhusari","doi":"10.1002/9781119795667.ch1","DOIUrl":"https://doi.org/10.1002/9781119795667.ch1","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"430 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ransomware: Threats, Identification and Prevention","authors":"S. Thakur, S. Chaudhari, Bharti Joshi","doi":"10.1002/9781119795667.ch16","DOIUrl":"https://doi.org/10.1002/9781119795667.ch16","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130860765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Dushyant, Garg Muskan, Annu, Ankur Gupta, S. Pramanik
{"title":"Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach","authors":"K. Dushyant, Garg Muskan, Annu, Ankur Gupta, S. Pramanik","doi":"10.1002/9781119795667.ch12","DOIUrl":"https://doi.org/10.1002/9781119795667.ch12","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121296792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Improvement Technique for Distributed Control System (DCS) and Supervisory Control‐Data Acquisition (SCADA) Using Blockchain at Dark Web Platform","authors":"A. Rajawat, Romil Rawat, Kanishk Barhanpurkar","doi":"10.1002/9781119795667.ch14","DOIUrl":"https://doi.org/10.1002/9781119795667.ch14","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127948193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Neural Network Applications in Analysis of Forensic Science","authors":"K. R. Padma, K. Don","doi":"10.1002/9781119795667.ch3","DOIUrl":"https://doi.org/10.1002/9781119795667.ch3","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132888449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Insight into Digital Forensics: History, Frameworks, Types and Tools","authors":"G. M. Jones, S. Winster","doi":"10.1002/9781119795667.ch6","DOIUrl":"https://doi.org/10.1002/9781119795667.ch6","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115091822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Robotics through Synthetic Psychology","authors":"G. Saini, Shabnam","doi":"10.1002/9781119795667.ch5","DOIUrl":"https://doi.org/10.1002/9781119795667.ch5","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum and Post‐Quantum Cryptography","authors":"Om Pal, M. Jain, B. K. Murthy, Vinay Thakur","doi":"10.1002/9781119795667.ch2","DOIUrl":"https://doi.org/10.1002/9781119795667.ch2","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126979523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications","authors":"Rashmi Salavi, M. Math, U. Kulkarni","doi":"10.1002/9781119795667.ch4","DOIUrl":"https://doi.org/10.1002/9781119795667.ch4","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of Machine Learning Techniques in the Realm of Cybersecurity","authors":"Koushal Kumar, B. P. Pande","doi":"10.1002/9781119795667.ch13","DOIUrl":"https://doi.org/10.1002/9781119795667.ch13","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124673132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}