Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Bio-inspiring cyber security and cloud services : trends and innovations
Hassanien A., Kim T., Kacprzyk J., Awad A., Springer Publishing Company, Incorporated, Berlin, Germany, 2014. 585 pp. Type: Book (978-3-662436-15-8)
Date Reviewed: Feb 11 2015

Genetic algorithms and bio-inspired techniques are currently crucial in many intelligent systems. This book on bio-inspiring cyber security and cloud services is part of Springer’s “Intelligent Systems Reference Library” series, which discusses advances in intelligent systems. The book is intended for students and researchers. It is divided into four parts: “Bio-Inspiring Systems in Cyber Security,” “Mobile Ad Hoc Networks and Key Management,” “Biometrics Technology and Applications,” and “Cloud Security and Data Services.”

The first part contains five chapters. Chapter 1 describes a bio-inspired distributed agent correlation approach for intrusion detection alerts. Chapter 2 discusses the current challenges to cyber-physical systems security and presents a bio-inspired evolutionary sensory system for cyber-physical systems security. Chapter 3 presents an authentication scheme for medical image watermarking. Chapter 4 looks at various bio-inspired techniques for watermarking medical images. Chapter 5 looks at image authentication systems with precise tamper localization.

The second part has six chapters. Chapter 6 studies an ant colony multiagent-based routing algorithm for mobile ad hoc networks. Chapter 7 discusses self-protection and self-healing in wireless sensor networks (WSNs). Chapter 8 looks at the challenges in investigating cyber crimes in the Middle East and North Africa. Chapter 9 presents a multi-layer machine learning-based intrusion detection system. Chapter 10 describes a key management scheme with high security in WSNs. The focus here is on relay networks. Chapter 11 discusses key pre-distribution techniques for WSN security services.

The third part has five chapters. Chapter 12 explores the fusion of multiple biometric traits such as fingerprints, palm prints, and the iris. Chapter 13 studies biometric recognition systems using multispectral imaging. Features are extracted from multispectral palm prints. Chapter 14 mentions the benefits of the electrocardiogram (ECG) for biometric recognition. Chapter 15 proposes a recognition framework for human face recognition, and chapter 16 reviews traditional as well as biometric mobile authentication mechanisms.

The fourth part has six chapters. Chapter 17 presents a comprehensive survey on cloud services discovery and selection. Chapter 18 reviews recent work in the area of data and application security that is pertinent to cloud computing. Chapter 19 looks at new security issues in cloud data services and possible solutions. Chapter 20 proposes a reputation trust management system for mobile ad hoc clouds. Chapter 21 reviews some well-known systems in location-based service applications, and focuses on secured and networked emergency notification without the use of global positioning system (GPS)-enabled devices. Chapter 22, the last chapter of the book, studies how cloud customers may perform self-monitoring and check availability.

This edited volume includes contributions from several authors, many of whom are Egyptian. The volume tries to highlight the advantages of bio-inspiring cyber security. This is still an area where a lot of research is being carried out. The editors have numerous publications, including several in the field of cyber security. They have tried to bring uniformity to the book despite contributions on diverse topics from the authors. This reference book will be an eye-opener to the applications of bio-inspired techniques for cyber security. I recommend it for students and researchers in that area.

Reviewer:  S. V. Nagaraj Review #: CR143182 (1505-0325)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (C.2.0 ... )
 
 
Biology And Genetics (J.3 ... )
 
 
Cloud Computing (C.2.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy