7 Part 3: CYBERSECURITY 18 Fog Computing Perspective: Technical Trends, Security Practices, and Recommendations 18.1 Introduction 18.2 Characteristics of Fog Computing 18.3 Reference Architecture of Fog Computing 18.4 CISCO IOx Framework 18.5 Security Practices in CISCO IOx 18.6 Security Issues in Fog Computing 18.7 Machine Learning for Secure Fog Computing 18.8 Existing Security Solution in Fog Computing 18.9 Recommendation and Future Enhancement 18.10 Conclusion References 19 Cybersecurity and Privacy Fundamentals 19.1 Introduction 19.2 Historical Background and Evolution of Cyber Crime 19.3 Introduction to Cybersecurity 19.4 Classification of Cyber Crimes 19.5 Reasons Behind Cyber Crime 19.6 Various Types of Cyber Crime 19.7 Various Types of Cyber Attacks in Information Security 19.8 Cybersecurity and Privacy Techniques 19.9 Essential Elements of Cybersecurity 19.10 Basic Security Concerns for Cybersecurity 19.11 Cybersecurity Layered Stack 19.12 Basic Security and Privacy Check List 19.13 Future Challenges of Cybersecurity References 20 Changing the Conventional Banking System through Blockchain 20.1 Introduction 20.2 Literature Survey 20.3 Methodology and Tools 20.4 Experiment 20.5 Results 20.6 Conclusion 20.7 Future Scope References 21 A Secured Online Voting System by Using Blockchain as the Medium 21.1 Blockchain-Based Online Voting System 21.2 Literature Review References 22 Artificial Intelligence and Cybersecurity: Current Trends and Future Prospects 22.1 Introduction 22.2 Literature Review 22.3 Different Variants of Cybersecurity in Action 22.4 Importance of Cybersecurity in Action 22.5 Methods for Establishing a Strategy for Cybersecurity 22.6 The Influence of Artificial Intelligence in the Domain of Cybersecurity 22.7
Автор: | Группа авторов |
Издательство: | John Wiley & Sons Limited |
Серия: | |
Жанр произведения: | Техническая литература |
Год издания: | 0 |
isbn: | 9781119761662 |
![](/nwim_read1006950.jpg)
15.3 Cloud Computing and Big Data in Healthcare
15.4 Big Data Healthcare and IoT
15.5 Wearable Devices for Patient Health Monitoring
15.6 Big Data and Industry 4.0
15.7 Conclusion
References
16 Computing Analysis of Yajna and Mantra Chanting as a Therapy: A Holistic Approach for All by Indian Continent Amidst Pandemic Threats
16.1 Introduction
16.2 Literature Survey
16.3 Experimental Setup Protocols With Results
16.4 Future Scope and Limitations
16.5 Novelty
16.6 Recommendations
16.7 Applications of Yajna Therapy
16.8 Conclusions
Acknowledgement
References
Key Terms and Definitions
17 Extraction of Depression Symptoms From Social Networks
17.1 Introduction
17.2 Data Mining in Healthcare
17.3 Social Network Sites
17.4 Symptom Extraction Tool
17.5 Sentiment Analysis
17.6 Conclusion
References