
Cybersecurity Defensive Walls in Edge Computing
- 1st Edition - October 1, 2025
- Imprint: Academic Press
- Editors: Agbotiname Lucky Imoize, Fatos Xhafa, Mohammad S. Obaidat, Houbing Herbert Song
- Language: English
- Paperback ISBN:9 7 8 - 0 - 4 4 3 - 3 4 1 0 9 - 0
- eBook ISBN:9 7 8 - 0 - 4 4 3 - 3 4 1 1 0 - 6
Cybersecurity Defensive Walls in Edge Computing dives into the creation of robust cybersecurity defenses for increasingly vulnerable edge devices. This book examines the unique… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteCybersecurity Defensive Walls in Edge Computing dives into the creation of robust cybersecurity defenses for increasingly vulnerable edge devices. This book examines the unique security challenges of edge environments, including limited resources and potentially untrusted networks, providing fundamental concepts for real-time vulnerability detection and mitigation through novel system architectures, experimental frameworks, and AI/ML techniques. Researchers and industry professionals working in cybersecurity, edge computing, cloud computing, defensive technologies, and threat intelligence will find this to be a valuable resource that illuminates critical aspects of edge-based security to advance theoretical analysis, system design, and practical implementation of defensive walls. With a focus on fast-growing edge application scenarios, this book offers valuable insights into strengthening real-time security for the proliferation of interconnected edge devices.
- Provides researchers with insights into real-world scenarios of the design, development, deployment, application, management, and benefits of cybersecurity defensive walls in edge computing
- Discusses critical cybersecurity defensive walls and their applications to resolve security and privacy issues which affect all parties in edge computing and provide practical learning-based solutions to solve these problems
- Presents well-structured chapters from industry experts and global researchers who consider unique security challenges, including limited resources, diverse device types, and potentially untrusted network environments
Graduate students, researchers, and professionals from academia and industry, working in the fields of computer science, cybersecurity, big data, and risk management
Preface
1. Fundamental concepts of cybersecurity and edge computing
2. Architectural Foundations for Cybersecurity in Edge Computing
3. Advanced adversarial defense mechanisms in edge computing
4. Microsegmentation for containerized microservices in edge computing
5. Extreme Gradient Boosting and Random Forest based Intrusion Detection System
6. Reidentification Risks in Distributed Differentially Private Data Leveraging Large Language Models
7. Cutting-Edge Advances in Edge Computing-assisted Optical Wireless Communications
8. Fortifying the Edge: Zero-Knowledge Proofs for Scalable Block Verification in NEAR Protocol
9. Detection of Hardcoded Login Credentials via Network Function
10. Advancing Cyber Resilience in Edge Computing with Secure Distributed Machine Learning
11. Defensive Walls Against Sophisticated ML-Orchestrated Attacks in Edge Computing
12. Biometric-Based Access Control mechanism for Edge Computing Resources and Services
13. Silent Threat: RAT Attack Strategy and Real Case Analysis in Edge Computing
14. Application of Blockchain for Secured Edge Computing System
15. Support Vector Machines for Enhancing Vulnerability Management and Encryption Protocols in Edge Computing
16. Social and ethical solutions to defeat cyber attacks in edge computing
17. Legal Framework and Regulatory Policies for Cyber-edge Computing Systems
1. Fundamental concepts of cybersecurity and edge computing
2. Architectural Foundations for Cybersecurity in Edge Computing
3. Advanced adversarial defense mechanisms in edge computing
4. Microsegmentation for containerized microservices in edge computing
5. Extreme Gradient Boosting and Random Forest based Intrusion Detection System
6. Reidentification Risks in Distributed Differentially Private Data Leveraging Large Language Models
7. Cutting-Edge Advances in Edge Computing-assisted Optical Wireless Communications
8. Fortifying the Edge: Zero-Knowledge Proofs for Scalable Block Verification in NEAR Protocol
9. Detection of Hardcoded Login Credentials via Network Function
10. Advancing Cyber Resilience in Edge Computing with Secure Distributed Machine Learning
11. Defensive Walls Against Sophisticated ML-Orchestrated Attacks in Edge Computing
12. Biometric-Based Access Control mechanism for Edge Computing Resources and Services
13. Silent Threat: RAT Attack Strategy and Real Case Analysis in Edge Computing
14. Application of Blockchain for Secured Edge Computing System
15. Support Vector Machines for Enhancing Vulnerability Management and Encryption Protocols in Edge Computing
16. Social and ethical solutions to defeat cyber attacks in edge computing
17. Legal Framework and Regulatory Policies for Cyber-edge Computing Systems
- Edition: 1
- Published: October 1, 2025
- Imprint: Academic Press
- No. of pages: 450
- Language: English
- Paperback ISBN: 9780443341090
- eBook ISBN: 9780443341106
AI
Agbotiname Lucky Imoize
Agbotiname Lucky Imoize is al Lecturer in the Department of Electrical and Electronics Engineering at the University of Lagos, Nigeria. He was awarded the Fulbright Fellowship as a Visiting Research Scholar at the Wireless@VT Lab in the Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA. He is currently a research scholar at Ruhr University Bochum, Germany, under the Nigerian Petroleum Technology Development Fund (PTDF) and the German Academic Exchange Service (DAAD) through the Nigerian-German Postgraduate Program. He is a Registered Engineer with the Council for the Regulation of Engineering in Nigeria (COREN) and a Nigerian Society of Engineers (NSE) member. He has co-edited two books and coauthored over 90 wireless communication papers in peer-reviewed journals. His research interests are 6G wireless communication, Artificial Intelligence, and the Internet of Things.
Affiliations and expertise
Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Lagos, NigeriaFX
Fatos Xhafa
Fatos Xhafa, PhD in Computer Science, is Full Professor at the Technical University of Catalonia (UPC), Barcelona, Spain. He has held various tenured and visiting professorship positions. He was a Visiting Professor at the University of Surrey, UK (2019/2020), Visiting Professor at the Birkbeck College, University of London, UK (2009/2010) and a Research Associate at Drexel University, Philadelphia, USA (2004/2005). He was a Distinguished Guest Professor at Hubei University of Technology, China, for the duration of three years (2016-2019). Prof. Xhafa has widely published in peer reviewed international journals, conferences/workshops, book chapters, edited books and proceedings in the field (H-index 55). He has been awarded teaching and research merits by the Spanish Ministry of Science and Education, by IEEE conferences and best paper awards. Prof. Xhafa has an extensive editorial service. He is founder and Editor-In-Chief of Internet of Things - Journal - Elsevier (Scopus and Clarivate WoS Science Citation Index) and of International Journal of Grid and Utility Computing, (Emerging Sources Citation Index), and AE/EB Member of several indexed Int'l Journals. Prof. Xhafa is a member of IEEE Communications Society, IEEE Systems, Man & Cybernetics Society and Founder Member of Emerging Technical Subcommittee of Internet of Things.
His research interests include IoT and Cloud-to-thing continuum computing, massive data processing and collective intelligence, optimization, security and trustworthy computing and machine learning, among others. He can be reached at [email protected]. Please visit also http://www.cs.upc.edu/~fatos/ and at http://dblp.uni-trier.de/pers/hd/x/Xhafa:Fatos
Affiliations and expertise
Full Professor of Computer Science, Universitat Politècnica de Catalunya (UPC), Barcelona, SpainMO
Mohammad S. Obaidat
Mohammad S. Obaidat (Fellow IEEE, Fellow SCS, Fellow AAIA, and Fellow of FTRA) is a Full Professor in the Department of Computer Science at King Abdullah II School of Information Technology (KASIT), University of Jordan, Amman, Jordan. He is also a Distinguished Professor at SRM University, India. He has published around 1,200 technical articles, 100 books, and 70 book chapters. He is Editor-in-Chief of three scholarly journals and an editor of numerous international journals. He is the founding Editor-in-Chief of Wiley Security and Privacy Journal. Moreover, he is the founder or co-founder of five International Conferences. His areas of interest are in wireless networks, cyber security, security of e-Systems, computer networks, data analytics, and computer architecture, parallel computing: Architecture, and Algorithms, and performance evaluation of computer networks and systems.
Affiliations and expertise
University of Jordan, Aman, JordanHS
Houbing Herbert Song
Houbing Song, Security and Optimization for Networked Globe Laboratory, University of Maryland, Baltimore County (UMBC), Baltimore, USA. His research interests include cyber-physical systems, cybersecurity and privacy, IoT, big data analytics, connected vehicles, smart health, wireless communications, and networking. Dr. Song has edited and authored several books in the field, including Cyber-Physical Systems: Foundations, Principles and Applications.
Affiliations and expertise
University of Maryland, Baltimore County (UMBC), Baltimore, USA