Detecting and Mitigating Robotic Cyber Security Risks

Author: Raghavendra Kumar   Prasant Kumar Pattnaik   Priyanka Pandey  

Publisher: IGI Global‎

Publication year: 2017

E-ISBN: 9781522521556

Subject: TP24 robotic technology

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Chapter

Acknowledgment

Section 1: Basic Concept of Security and Privacy

Chapter 1: A Survey

Chapter 2: A Practical Approach of Network Simulation

Chapter 3: Hindi Optical Character Recognition and Its Applications

Chapter 4: Android Permissions

Chapter 5: Distributed System Implementation Based on “Ants Feeding Birds” Algorithm

Section 2: Cloud and Mobile Security

Chapter 6: A Survey

Chapter 7: Digital Signature Schemes Based on Two Hard Problems

Chapter 8: Cloud Auditor Loyalty Checking Process Using Dual Signature

Chapter 9: Cloud Security Using 2-Factor Image Authentication Technique

Chapter 10: Utilizing Soft Computing Application for QOS and Security Optimization by Meta-Heuristic-Based Genetic Approach

Section 3: Cyber Security Concepts

Chapter 11: Cyber Crime and Cyber Security

Chapter 12: Pragmatic Solutions to Cyber Security Threat in Indian Context

Chapter 13: Role of Cyber Security in Today's Scenario

Chapter 14: Exploring Cyber Security Vulnerabilities in the Age of IoT

Section 4: Robotics Cyber Security Risk

Chapter 15: An Approach towards Survey and Analysis of Cloud Robotics

Chapter 16: Mobile Robotics

Chapter 17: Cloud Robotics

Chapter 18: Intelligent Agents and Autonomous Robots

Chapter 19: Survey of Recent Cyber Security Attacks on Robotic Systems and Their Mitigation Approaches

Chapter 20: Mobile Agent Communication, Security Concerns, and Approaches

Chapter 21: Cloud and Cyber Security through Crypt-Iris-Based Authentication Approach

Chapter 22: Cyber Security Risks in Robotics

Compilation of References

About the Contributors

Index

The users who browse this book also browse


No browse record.