Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Book . 2024
License: CC BY
Data sources: ZENODO
ZENODO
Book . 2024
License: CC BY
Data sources: Datacite
ZENODO
Book . 2024
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Cyber Security using Data Structures

Authors: Jena, S. R.; M., Dileep Kumar;

Cyber Security using Data Structures

Abstract

Welcome to the future of cyber security!!! In the digital age, where information reigns supreme and threats lurk in every byte, cyber security has become the cornerstone of a safe and connected world. Yet, securing this vast digital landscape requires more than just vigilance; it demands a deep understanding of the very structures that hold our data captive. This book bridges the gap between the abstract realm of data structures and the tangible world of cyber defense. We delve into the intricate workings of stacks, queues, trees, and graphs, not as mere academic exercises, but as powerful tools for building robust and resilient systems.Throughout these pages, you'll discover how data structures form the backbone of intrusion detection systems, malware analysis tools, and encryption algorithms. You'll learn to harness their efficiency to sift through oceans of data, identify malicious patterns, and thwart cyberattacks before they wreak havoc. This book is not just a technical manual; it's an invitation to think like a cyber warrior. It empowers you to see the digital world through a new lens, where every line of code and every byte of data becomes a potential weapon or shield. So, arm yourself with knowledge, sharpen your algorithmic skills, and prepare to step into the front lines of the digital battlefield. The future of cyberspace, and the safety of the information we cherish, depends on it. The book contains 13 chapters. They are given as follows: 1. Introduction to Cyber security and Data Structures 2. Fundamentals of Data Structures 3. Cryptography and Data Structures 4. Access Control with Trees and Graphs 5. Secure Data Storage 6. Buffer Management and Stack/Queue Security 7. Bitwise Operations in Cryptography 8. Bloom Filters for Malware Detection 9. Trie Data Structure for IP Lookup 10. Priority Queues in Intrusion Detection 11. Case Studies and Practical Applications 12. Future Trends and Emerging Technologies 13. Best Practices and Recommendations Appendix References

Related Organizations
Keywords

Cyber Security, Data Structures

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average