IGI Global, USA, 2017. — 416 p. — (Advances in Information Security, Privacy, and Ethics). — ISBN: 1522521542.
Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats.
Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts.
The evolution of robotics has ranged from the basic remote controlled systems to humanoid robots. With applications as well as accuracy increasing for every new system implemented, security risks too have been making their way into the new invention. Since different robots have been created for different purposes in different fields like the defense, household, medical or the space, protecting systems against their exploitation is of utmost importance as these fields incorporate sensitive as well as intricate tasks. This chapter focuses on the security aspects of Robotics. The necessity of Cyber security in Robotics has been explored by taking different kinds of robots used in different fields. The current state of Robotics is vulnerable to many risks and several case studies have been highlighted to support the need of securing Robotics by identifying several risks to which it is vulnerable.
Basic Concept of Security and Privacy
A Survey: Vulnerabilities Present in PDF Files
A Practical Approach of Network Simulation
Hindi Optical Character Recognition and Its Applications
Android Permissions: Attacks and Controls
Distributed System Implementation Based on “Ants Feeding Birds” Algorithm: Electronics
Transformation via Animals and Human
Cloud and Mobile Security
A Survey: Threats and Vulnerabilities in Cloud
Digital Signature Schemes Based on Two Hard Problems
Cloud Auditor Loyalty Checking Process Using Dual Signature
Cloud Security Using 2-Factor Image Authentication Technique
Utilizing Soft Computing Application for QOS and Security Optimization by Meta-Heuristic-
Based Genetic Approach
Cyber Security Concepts
Cyber Crime and Cyber Security: A Quick Glance
Pragmatic Solutions to Cyber Security Threat in Indian Context
Role of Cyber Security in Today’s Scenario
Exploring Cyber Security Vulnerabilities in the Age of IoT
Robotics Cyber Security Risk
An Approach towards Survey and Analysis of Cloud Robotics
Mobile Robotics
Cloud Robotics: Robot Rides on the Cloud – Architecture, Applications, and Challenges
Intelligent Agents and Autonomous Robots
Deepshikha Bhargava, Amity University Rajasthan, India
Survey of Recent Cyber Security Attacks on Robotic Systems and Their Mitigation Approaches
Cyber Security Risks in Robotics