Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/16774
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Periyasami, Karthikeyan | - |
dc.contributor.author | Katina, Polinpapilinho F | - |
dc.contributor.author | Ramasamy, Rajagopal | - |
dc.date.accessioned | 2024-12-12T09:32:59Z | - |
dc.date.available | 2024-12-12T09:32:59Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | pp. 1-266 | en_US |
dc.identifier.isbn | 9788770041874 | - |
dc.identifier.isbn | 9788770041881 | - |
dc.identifier.uri | https://www.ebook.riverpublishers.com/book_details.php?book_id=1149 | - |
dc.identifier.uri | https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/16774 | - |
dc.description.abstract | This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace solutions to counteract attacks. The discussion extends to mitigation strategies against weaponized AI in cyber-attacks, countermeasures for both autonomous vehicles and cyberspace attacks, as well as the limitations and future prospects of artificial intelligence (AI) and data defense in aerospace cybersecurity. A network comprising nodes can establish both cyberspace and outer space platforms for data exchange. Cyberspace finds diverse applications, including commercial endeavors and military defense. The integration of autonomous vehicles, unmanned aircraft systems (UAS), and drones into outer space environments is facilitated through their connection to cyberspace. One illustrative example involves the utilization of blockchain-based secure drone systems for product delivery, leveraging the combined capabilities of cyberspace and outer space security technologies. This book elucidates the intricate dynamics between cyber operations and the expanding realm of autonomous outer cyberspace, presenting new security challenges arising from heightened complexity and emerging vulnerabilities. © 2024 River Publishers. All rights reserved. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Cyber Space and Outer Space Security | en_US |
dc.publisher | River Publishers | en_US |
dc.subject | Cyber Space | en_US |
dc.subject | Outer Space Security | en_US |
dc.subject | Emerging Vulnerabilities | en_US |
dc.subject | Network | en_US |
dc.subject | Artificial Intelligence (Ai) | en_US |
dc.title | Cyber Space and Outer Space Security | en_US |
dc.type | Book | en_US |
Appears in Collections: | Book/ Book Chapters |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.