Table of Contents
Preface
Chapter 1. New Theorems for Analyzing Digital Logic Gates
J.O. Nehinbe, PhD
ICT Security Solutions, W/Africa, Lagos, Nigeria
Chapter 2. The Future of Intrusion Detection Systems in Cloud Computing
Sunil Gautam¹ and Azriel Henry²
¹Department of Computer Science and Engineering, Institute of Technology, Nirma University Ahmedabad, Gujarat, India
²Department of Computer Science and Engineering, Institute of Advanced Research, Gandhinagar, Gujarat, India
Chapter 3. Storage Structure and Management of Distributed Ledger Technologies (DLTs) in Blockchain Systems
Tzu-Lun Huang¹, PhD and Jason Huang²
¹Department of Computer Science and Information Engineering, St. John’s University, Taiwan
²Advanced Financial Engineering LLC, CA, USA
Chapter 4. Random Walk of Particles during the Formation of Chladni Patterns
Igor Grabec
Slovenian Academy of Sciences and Arts, Faculty of Computer and Informaticas, University of Ljubljana
Chapter 5. Foraging Performed by the Random Walk
Igor Grabec, Ada Elizabeta Sok
Slovenian Academy of Sciences and Arts, Faculty of Medicine, University of Ljubljana
Chapter 6. Printed Circuit Boards from a Recycling Point of View
M. Kaya, PhD
Mining Engineering Department, Eskisehir Osmangazi University, Eskisehir, Turkey
Chapter 7. Text Data Curation via Sparse Distributed Representations
Martin Marinov, PhD
Department of Automation Information and Control Systems, Technical University of Sofia, Sofia, Bulgaria
Chapter 8. Intrusion Detection Systems for Advanced Ecosystem Based on IoT
Sunil Gautam¹, Ketaki Pattani² and Kaushal Singh²
¹Department of Computer Science and Engineering, Institute of Technology, Nirma University Ahmedabad, Gujarat, India
²Department of Physical Sciences and Engineering, Institute of Advanced Research (IAR), Gandhinagar, Gujarat, India
Chapter 9. Digital Forensics Process in the Cloud Computing Environment – Parameters, Issues, Models, and Implementations
Dr. Sulabha Vilas Patil
Sant Gadge Baba Amravati University, Amravati, Maharashtra, India
Chapter 10. The Praxis of the Hegemony in Cyber Warfare
Joshua Ojo Nehinbe
ICT Security Solutions, West Africa
Index