Chapter
Acknowledgments and Thanks
Chapter 1: Dependability of Container-Based Data-Centric Systems
2 Component-Based Software Engineering
2.2 Architectural Approaches for Data Management
2.2.1 Functionality and data in a container
2.2.2 Clean separation between functionality and data in containers
2.2.3 Separate distributed data infrastructure and services
2.3 Emerging Container Interoperability Architectures
3 Key Concepts and Relations in Dependability
3.1 Dependability Attributes
3.2.3 Fault forecasting and removal
3.3 Dependability Threats
4 Serving Virtual Machine and Container Images
5 SWITCH Case Study: Managing QoS in the Software Engineering Process
Chapter 2: Risk Assessment and Monitoring in Intelligent Data-Centric Systems
1.1 Current Architectural Solutions
1.2 Future Architectural Solutions
2 Risk Factors in DCS Management
3 Traditional Information Risk Assessment
4 A Risk Assessment Approach for CPS
5.1 On the Structure of the Models
5.2 On the Iterative Solution Process
6.2 The Counteraction Model
6.3 Combining and Analyzing the BN Models
Chapter 3: The Cyber Security Challenges in the IoT Era
2 The Cyber Security Scenario
2.1 Where Attacks Happen, Attacks Targets and Patterns
3 How IOT Will Affect the Cyber Security Scenario
3.1 IoT Development Areas, Where IoT is Expected to Grow
3.2 IoT's Impact on Digitalization
3.3 IoT Digitalization Strategies
4 The Promising World of Industrial Control Systems (ICS)
5 A Different Approach in the Automotive Sector
6 Artificial Intelligence
Chapter 4: IoT and Sensor Networks Security
2 IoT Elements and Architecture
3 IoT Application Domains
4 Security, Safety, and Privacy Aspects
7.1 Physical Layer Attacks
7.3 Network Layer Attacks
7.4 Transport Layer Attacks
7.5 Application Layer Attacks
Chapter 5: Smart Access Control Models in Sensor Network
2 Background and Related Work
Chapter 6: Smart Sensor and Big Data Security and Resilience
2 The IoT System Architecture
2.4 Big Data Storages and Services
2.5 Smart Applications and Services
3 (Big) Data Driven Management and Risks of the Value Loop
4.4 Disaster Management, Emergency, and Recovery
4.5 Smart Transportation and Logistics
4.6 Other Application Domains
5 Discussion and Analysis
5.1 Security Concerns and Recommendations
5.2 Resilience Concerns and Guidelines
Chapter 7: Load Balancing Algorithms and Protocols to Enhance Quality of Service and Performance in Data of WSN
3. Load Balancing Techniques in a WSN
3.1 Load Balancing Protocols in a WSN
3.2 Load Balancing Algorithms in WSN
5 Performance Issues in WSN
6.1 Vulnerabilities in the WSN
6.2 Security Requirements in the WSN
6.3 Attacks and Countermeasures in WSN
6.3.1 Types of attacks in the WSN
6.3.2 Existing defense mechanism in WSN
Chapter 8: Machine Learning Techniques for Threat Modeling and Detection
2 Cybersecurity: A Challenge
3 Bio-Inspired Methods for Cyber Security Practical Examples and Implementations
3.1 Practical Realizations of the Bio-Inspired Optimization Techniques Applied to Cyber Security in the Application Layer
3.1.1 Genetic algorithm to generate regular expressions and to detect SQL injection attacks
3.1.2 Using genetic algorithm to identify structure in raw packets in order to detect anomalous HTTP requests
3.2 Practical Realizations of the Techniques Mimicking Behavior of Living Organisms
3.3 Ensemble of Classifiers
3.3.1 Heterogeneous data sources correlation
3.4 Practical Realization of the Collective Intelligence and Distributed Computation
Chapter 9: Cognitive Distributed Application Area Networks
3 The Social Media Technologies as Global Brain
3.2 The Web as a Global Brain
3.2.2 Bots as nonhuman agents in distributed cognition
4 A distributed perspective of a trust-based architecture
4.1 Pervasive Computing and Trust
4.3 Results and Discussion
Chapter 10: A Novel Cloud-Based IoT Architecture for Smart Building Automation
1 Introduction to the Internet of Things
2 Main Enabling Technologies and Protocols
2.1 Wireless Infrastructure Protocols
2.1.1 Bluetooth low energy (BLE)
2.2 Application Layer Protocols
2.2.1 Hypertext transfer protocol (HTTP)
2.2.2 Constrained application protocol (CoAP)
2.2.3 Message queue telemetry transport (MQTT)
3 Evolution of IoT Architectures
3.2 The Appearance of a Middleware
3.3 Toward Intelligent IoT Systems
4 Cloud-Based IoT Architecture Presentation
4.3 Data Aggregator Layer
5 Use Case: Smart Building Automation
5.2 Data Transformation and Storage
Chapter 11: Monitoring Data Security in the Cloud: A Security Sla-Based Approach
2 Cloud Security Monitoring
3 SLA-Based Security Monitoring
4 The SLA-Based Monitoring Architecture
4.1 The SPECS Monitoring Architecture
4.1.1 The enabling cloud automation technology: Chef
5 A Complex Monitoring System for DoS Detection
5.1 DoS Detection and Mitigation
5.1.2 The DoS protection mechanism
5.2 Vulnerability Scanning and Management
5.2.2 The vulnerability scanning mechanism
5.3 The Refined Monitoring Architecture: Integrating the Security Mechanisms
Chapter 12: Hardening iOS Devices Against Remote Forensic Investigation
2 Security and Trust in the iOS Environment
2.1 Remote Access via Device Trust Relationship
2.2 Sensitive iOS Device Services
2.3 Forensic Acquisition Approaches
3.1 Delete Existing Pairing Records
3.2 Limit Sensitive Services to USB (Disable Over Wireless)
3.3 Disable Some Services
3.4 Lock Pairing With New Devices
4 Lockup: iOS Hardening and Antiforensics
4.2.1 Level 1: Suitable for MDM
4.2.2 Level 2: Suitable for syncing applications
4.2.3 Level 3: Suitable for backup
4.2.4 Level 4: Suitable for syncing media files
4.2.5 Level 5: Suitable for media sharing
4.2.6 Level 6: No sensitive services
4.2.7 Level 7: No lockdown services at all
4.2.8 Additional considerations
4.3 Implementation Details
5.1 The Jailbreak Process
5.2 Effects of Jailbreak on the Security Model
5.3 Antiforensic Implications
5.4 Countermeasures: Anti-Antiforensics
6 Conclusions and Future Work
Chapter 13: Path Loss Algorithms for Data Resilience in Wireless Body Area Networks for Healthcare Framework
2 Overview of WBAN Framework
2.1 Characteristics of Wireless Channel in WBANs
2.2 WBAN and WSN Network Topology
2.3 Existing WBAN Applications
2.4 Typical WBAN Sensor Specifications
3 Message Integrity in Wireless Communication
3.1 Encryption Algorithm in WBAN
3.2 Hash Function Technique
3.3 Elliptic Curve Cryptography Technique (ECC)
4 Wireless Standards for WBANs
4.2 Medical Implant Communication Service (MICS)
4.4 Performance Parameters
Chapter 14: Designing Resilient and Secure Large-Scale Crisis Information Systems
2 Reliability and Confidentiality Requirements
3 State of the Art for Reliability and Confidentiality Approaches
4 A Platform for Crisis Information Sharing
5.1 Replication Scheme in Crisis Information Systems
5.2 Resilient Multicasting in Crisis Information Systems
5.3 Confidential Communications in the CISP Platform