The Smart Cyber Ecosystem for Sustainable Development. Группа авторов
15.3 Cloud Computing and Big Data in Healthcare 15.4 Big Data Healthcare and IoT 15.5 Wearable Devices for Patient Health Monitoring 15.6 Big Data and Industry 4.0 15.7 Conclusion References 16 Computing Analysis of Yajna and Mantra Chanting as a Therapy: A Holistic Approach for All by Indian Continent Amidst Pandemic Threats 16.1 Introduction 16.2 Literature Survey 16.3 Experimental Setup Protocols With Results 16.4 Future Scope and Limitations 16.5 Novelty 16.6 Recommendations 16.7 Applications of Yajna Therapy 16.8 Conclusions Acknowledgement References Key Terms and Definitions 17 Extraction of Depression Symptoms From Social Networks 17.1 Introduction 17.2 Data Mining in Healthcare 17.3 Social Network Sites 17.4 Symptom Extraction Tool 17.5 Sentiment Analysis 17.6 Conclusion References
7
Part 3: CYBERSECURITY
18 Fog Computing Perspective: Technical Trends, Security Practices, and Recommendations
18.1 Introduction
18.2 Characteristics of Fog Computing
18.3 Reference Architecture of Fog Computing
18.4 CISCO IOx Framework
18.5 Security Practices in CISCO IOx
18.6 Security Issues in Fog Computing
18.7 Machine Learning for Secure Fog Computing
18.8 Existing Security Solution in Fog Computing
18.9 Recommendation and Future Enhancement
18.10 Conclusion
References
19 Cybersecurity and Privacy Fundamentals
19.1 Introduction
19.2 Historical Background and Evolution of Cyber Crime
19.3 Introduction to Cybersecurity
19.4 Classification of Cyber Crimes
19.5 Reasons Behind Cyber Crime
19.6 Various Types of Cyber Crime
19.7 Various Types of Cyber Attacks in Information Security
19.8 Cybersecurity and Privacy Techniques
19.9 Essential Elements of Cybersecurity
19.10 Basic Security Concerns for Cybersecurity
19.11 Cybersecurity Layered Stack
19.12 Basic Security and Privacy Check List
19.13 Future Challenges of Cybersecurity
References
20 Changing the Conventional Banking System through Blockchain
20.1 Introduction
20.2 Literature Survey
20.3 Methodology and Tools
20.4 Experiment
20.5 Results
20.6 Conclusion
20.7 Future Scope
References
21 A Secured Online Voting System by Using Blockchain as the Medium
21.1 Blockchain-Based Online Voting System
21.2 Literature Review
References
22 Artificial Intelligence and Cybersecurity: Current Trends and Future Prospects
22.1 Introduction
22.2 Literature Review
22.3 Different Variants of Cybersecurity in Action
22.4 Importance of Cybersecurity in Action
22.5 Methods for Establishing a Strategy for Cybersecurity
22.6 The Influence of Artificial Intelligence in the Domain of Cybersecurity
22.7