回首頁 到查詢結果 [ subject:"Internet of things" ]

 

  • Securing the Internet of Things[electronic resource] :concepts, methodologies, tools, and applications /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    杜威分類號: 005.8
    書名/作者: Securing the Internet of Things : concepts, methodologies, tools, and applications // Information Resources Management Association, editor.
    出版者: Hershey, Pennsylvania : : IGI Global,, 2020.
    面頁冊數: 1 online resource (3 v.)
    標題: Internet of things - Security measures.
    ISBN: 9781522598671 (ebk.)
    ISBN: 9781522598664 (hbk.)
    書目註: Includes bibliographical references and index.
    內容註: Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Internet of things and security perspectives: current issues and trends ; Chapter 2. Technopsychology of IoT optimization in the business world ; Chapter 3. Security in application layer protocols of IoT: threats and attacks ; Chapter 4. Basic concepts of internet of things and game theory ; Chapter 5. Internet of Things in real life: applications ; Chapter 6. Mobile malware -- Section 2. Development and design methodologies. Chapter 7. Framework for threat analysis and attack modelling of network security protocols ; Chapter 8. Security in mission critical communication systems: approach for intrusion detection ; Chapter 9. An approach to designing IoT-based business models ; Chapter 10. Microsense: sensor framework for IoT system-on-chip ; Chapter 11. Security in network layer of IoT: possible measures to preclude ; Chapter 12. Towards autonomous IoT logistics objects ; Chapter 13. IoT architecture ; Chapter 14. A trusted ubiquitous healthcare monitoring system for hospital environment ; Chapter 15. Fault-recovery and coherence in Internet of Things choreographies ; Chapter 16. Innovative approach for improving intrusion detection using genetic algorithm with layered approach ; Chapter 17. Novel intrusion detection mechanism with low overhead for SCADA systems ; Chapter 18. A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) ; Chapter 19. Effective integration of reliable routing mechanism and energy efficient node placement technique for low power IoT networks ; Chapter 20. Mathematical representation of quality of service (qos) parameters for Internet of Things (IoT) ; Chapter 21. Making IoT run: opportunities and challenges for manufacturing companies ; Chapter 22. Trust management model based on fuzzy approach for ubiquitous computing ; Chapter 23. A location-aware architecture for an IoT-based smart museum -- Section 3. Tools and technologies. Chapter 24. The conceptual and architectural Design of an intelligent intrusion detection system ; Chapter 25. Agents for intrusion detection in MANET: a survey and analysis ; Chapter 26. Intrusion detection system (IDS) and their types ; Chapter 27. Mechanisms to secure communications in the IoT ; Chapter 28. An optimal routing algorithm for Internet of Things enabling technologies ; Chapter 29. Agent based noise detection using real time data analysis towards green environment -- Volume II. Chapter 30. Data mining techniques for distributed denial of service attacks detection in the Internet of Things: a research survey ; Chapter 31. An architecture to implement the Internet-of-Things using the prometheus methodology ; Chapter 32. I-BAT: a data-intensive solution based on the Internet of Things to predict energy behaviors in microgrids ; Chapter 33. Internet of things service provisioning platform for cross-application cooperation ; Chapter 34. IoT setup for co-measurement of water level and temperature ; Chapter 35. Data mining analytics for crime security investigation and intrusion detection ; Chapter 36. Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks ; Chapter 37. Reliability of IoT-aware BPMN healthcare processes ; Chapter 38. Detection protocol of possible crime scenes using Internet of Things (IoT) ; Chapter 39. Securing financial XML transactions using intelligent fuzzy classification techniques: a smart fuzzy-based model for financial XML transactions security using XML encryption ; Chapter 40. An approach based on social bees for an intrusion detection system by scenario ; Chapter 41. A new image encryption method based on improved cipher block chaining with optimization technique ; Chapter 42. Energy harvesting methods for Internet of Things ; Chapter 43. SEMDPA: a semantic web crossroad architecture for wsns in the Internet of Things ; Chapter 44. Internet of things (IOT) solution for increasing the quality of life of physically challenged people ; Chapter 45. Networked wireless sensors, active RFID, and handheld devices for modern car park management: WSN, RFID, and mob devs for car park management ; Chapter 46. Cellular IoT for mobile autonomous reporting in the smart grid ; Chapter 47. Hierarchal fuzzy logic controller and internet of things (IoT) information: disease spreading as a test case -- Section 4. Utilization and applications. Chapter 48. Converging technologies for the IoT: standardization activities and frameworks ; Chapter 49. Big data analysis and implementation in different areas using IoT ; Chapter 50. Protecting data confidentiality in the cloud of things ; Chapter 51. The human-IoT ecosystem: an approach to functional situation context classification ; Chapter 52. IoT and cloud computing: the architecture of microcloud-based IoT infrastructure management system ; Chapter 53. Exploring secure computing for the Internet of Things, Internet of Everything, Web of Things, and hyperconnectivity -- Volume III. Chapter 54. Review of discussions on Internet of Things (IoT): insights from Twitter analytics ; Chapter 55. Cognitive Internet of Everything (CIoE): state of the art and approaches ; Chapter 56. Innovation in product ddesign: IoT objects driven new product innovation and prototyping using 3D printers ; Chapter 57. Applying security to a big stream cloud architecture for the Internet of Things ; Chapter 58. Intrusion prevention system ; Chapter 59. Anonymous pico-payments for Internet of Things ; Chapter 60. Hybrid intrusion detection framework for ad hoc networks ; Chapter 61. Energy aware cluster head selection for maximizing lifetime improvement in Internet of Things ; Chapter 62. An approach to data annotation for Internet of Things ; Chapter 63. IoT for hospitality industry: paperless buffet management ; Chapter 64. IoT-based big data: from smart city towards next generation super city planning ; Chapter 65. Defensive mechanism against ddos attack to preserve resource availability for IoT applications ; Chapter 66. An approach of role updating in context-aware role mining ; Chapter 67. Ontology-driven situation assessment system design and development in IoT domains ; Chapter 68. Semantic approach to opening museum collections of everyday life history for services in Internet of Things environments ; Chapter 69. IoT based agriculture as a cloud and big data service: the beginning of digital India -- Section 5. Organizational and social implications. Chapter 70. From ubiquitous computing to the Internet of Things ; Chapter 71. The Internet of Things (IoT): capabilities and applications for smart supply chain ; Chapter 72. IoT in healthcare: breaching security issues ; Chapter 73. Actors in the emerging Internet of Things ecosystems ; Chapter 74. Security aspects in utility computing ; Chapter 75. Smart refrigerator with recipe assistance ; Chapter 76. Malicious data stream identification to improve the resource elasticity of handheld edge computing system -- Section 6. Critical issues and challenges. Chapter 77. Open source software in the Arab world: a literature survey ; Chapter 78. A literature review of the emerging field of IoT using RFID and its applications in supply chain management ; Chapter 79. Cybersecurity concerns in international business ; Chapter 80. Incorporating spatial queries into semantic sensor streams on the Internet of Things -- Section 7. Emerging trends. Chapter 81. The internet of things and beyond: rise of the non-human actors ; Chapter 82. Advancing personal learning using the Internet of Things: creating bonds for societal inclusivity ; Chapter 83. Intercloud: delivering innovative cloud services ; Chapter 84. The blockchain technology: applications and threats ; Chapter 85. Trust-based security mechanisms for self-organized networks (SONs).
    摘要、提要註: "This book examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. It highlights a range of topics such as cloud security, threat detection, and open source software"--
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9866-4
Export
取書館別
 
 
變更密碼
登入