Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included.

The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.

part I|63 pages

Emerging Security Trends

chapter Chapter 1|26 pages

Critical Analysis of Blockchain for Internet of Everything

ByBushra Hossain

chapter Chapter 2|26 pages

IoT Blockchain Integration

A Security Perspective
ByKazım Rıfat Özyılmaz, Arda Yurdakul

chapter Chapter 3|9 pages

An Overview of the Dark Web

ByShahrin Sadik, Mohiuddin Ahmed

part II|50 pages

Cyber Governance

chapter Chapter 4|25 pages

Cyber Security in the Public Sector

Awareness of Potential Risks among Public Policy Executives
ByTahmina Rashid, Khalid Chauhan

chapter Chapter 5|22 pages

A Benefits Realization Approach to Cyber Security Projects Implementation in Public Sector Organizations

ByMunir A. Saeed, Tahmina Rashid, Mohiuddin Ahmed

part III|98 pages

Artificial Intelligence in Cyber Security

chapter Chapter 6|37 pages

An Investigation of Performance Analysis of Machine Learning-Based Techniques for Network Anomaly Detection

ByKevin Chong, Mohiuddin Ahmed, Syed Mohammed Shamsul Islam

chapter Chapter 7|38 pages

The Kernel-Based Online Anomaly Detection Algorithm

Detailed Derivation and Development
BySalva Daneshgadeh, Tarem Ahmed, Al-Sakib Khan Pathan

chapter Chapter 7|20 pages

Secure Addressing Protocols for Mobile Ad Hoc Networks

ByUttam Ghosh, Pushpita Chatterjee, Raja Datta, Al-Sakib Khan Pathan, Danda B. Rawat

part IV|37 pages

Cyber Challenges

chapter Chapter 9|16 pages

Cryptographic Attacks, Impacts and Countermeasures

ByHazaa Al Fahdi, Mohiuddin Ahmed

chapter Chapter 10|19 pages

Cyber Security for Network of Things (NoTs) in Military Systems

Challenges and Countermeasures
ByMuhammad Imran Malik, Ian Noel McAteer, Peter Hannay, Ahmed Ibrahim, Zubair Baig, Guanglou Zheng