Advances in Computers
- 1st Edition, Volume 131 - August 25, 2023
- Editor: Ali Hurson
- Language: English
- Hardback ISBN:9 7 8 - 0 - 4 4 3 - 2 1 5 6 6 - 7
- eBook ISBN:9 7 8 - 0 - 4 4 3 - 2 1 5 6 7 - 4
Advances in Computers, Volume 131 is an eclectic volume inspired by recent issues of interest in research and development in computer science and computer engineering. Chapte… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteAdvances in Computers, Volume 131 is an eclectic volume inspired by recent issues of interest in research and development in computer science and computer engineering. Chapters in this new release include eHealth: enabling technologies, opportunities, and challenges, A Perspective on Cancer Data Management using Blockchain: Progress and Challenges, Cyber Risks on IoT Platforms and Zero Trust Solutions, A Lightweight Fingerprint Liveness Detection Method for Fingerprint Authentication System, and Collaborating Fog/Edge Computing with Industry 4.0 – Architecture, Challenges and Benefits, Raspberry Pi-s for Enterprise Cybersecurity Applications.
- Provides the authority and expertise of leading contributors from an international board of authors
- Presents the latest release in the Advances in Computers
- Covers the latest innovations in research and development in computer science and computer engineering
Graduate students, researchers, and university teachers
- Cover
- Title page
- Table of Contents
- Copyright
- Contributors
- Preface
- Chapter One: eHealth: Enabling technologies, opportunities and challenges
- Abstract
- 1: Introduction
- 2: Typical architecture and components of eHealth systems
- 3: Use cases
- 4: Enabling technologies
- 5: Open issues and challenges of eHealth
- 6: Conclusion
- Conflicts of interest
- Funding
- References
- Chapter Two: A review on cancer data management using blockchain: Progress and challenges
- Abstract
- 1: Introduction
- 2: Fundamentals of blockchain
- 3: Current trends in blockchain-based cancer care
- 4: Cryptocurrency for cancer care
- 5: Use cases in blockchain-based cancer management
- 6: Proposed architecture
- 7: Blockchain-assisted cancer management technologies
- 8: Challenges and recommendations
- 9: Conclusion
- References
- Chapter Three: Cyber risks on IoT platforms and zero trust solutions
- Abstract
- 1: Introduction
- 2: Background
- 3: Zero trust
- 4: Zero trust reference architecture
- 5: Zero trust architecture migration
- 6: Zero trust pillars
- 7: Zero trust network access, zero trust application access, and zero trust access
- 8: Zero trust for IoT security
- 9: Zero trust endpoint security for IoT platforms
- 10: Zero trust intrusion detection for IoT systems
- 11: Internet of things
- 12: IoT security and monitoring issues
- 13: Data privacy, policies, and regulations for IoT devices
- 14: IoT device hardening and security monitoring
- 15: Cyber risk management for IoT device security
- 16: Augmenting security in embedded IoT platforms
- 17: AWS and Azure IoT solutions
- 18: Google cloud IoT solutions
- 19: Conclusion and recommendations
- References
- Chapter Four: A realtime fingerprint liveness detection method for fingerprint authentication systems
- Abstract
- 1: Introduction
- 2: Concepts related to fingerprint and FIS
- 3: FLD and classification of FLD methods
- 4: Construction of a new LBP FLD
- 5: Experiment
- 6: Conclusion and further work
- References
- Chapter Five: Collaborating fog/edge computing with industry 4.0—Architecture, challenges and benefits
- Abstract
- 1: Introduction to edge computing
- 2: The architecture of edge computing
- 3: The architecture of fog computing
- 4: Benefits and challenges of edge computing
- 5: Benefits and challenges of fog computing
- 6: Fog computing and industry 4.0
- 7: Edge computing and industry 4.0
- 8: Use cases of fog/edge computing in industry 4.0
- 9: Conclusion
- References
- Further reading
- Chapter Six: Virtual Raspberry Pi-s with blockchain and cybersecurity applications
- Abstract
- 1: Introduction
- 2: Background
- 3: Securing virtual raspberry Pi devices
- 4: Raspberry Pi automation for advanced IoT systems
- 5: Virtualization for raspberry Pi and the internet of things
- 6: Blockchain methods and pigeonhole principle
- 7: IoT devices with smart surveillance monitoring systems
- 8: Virtual raspberry Pi security
- 9: Raspberry Pi for QEMU machine emulator/virtualizer
- 10: Pi-hole message tracking and raspberry Pi
- 11: Network security for raspberry Pi
- 12: Distributed computation and raspberry Pi-s
- 13: Hash authentication and integrated raspberry Pi capability
- 14: Motion passive infrared sensors for raspberry Pi
- 15: Conclusion
- References
- No. of pages: 310
- Language: English
- Edition: 1
- Volume: 131
- Published: August 25, 2023
- Imprint: Academic Press
- Hardback ISBN: 9780443215667
- eBook ISBN: 9780443215674
AH
Ali Hurson
Ali Hurson is an Electrical and Computer Engineering Professor at Missouri University of Science and Technology. His research in the past has been supported by various Government Agencies and Private industries. He has more than 350 publications in the area of databases, Computer Architecture, and Pervasive computing.
Affiliations and expertise
Missouri University of Science and Technology, Missouri, USARead Advances in Computers on ScienceDirect