語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing the Internet of Things = co...
~
Information Resources Management Association,
FindBook
Google Book
Amazon
博客來
Securing the Internet of Things = concepts, methodologies, tools, and applications /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Securing the Internet of Things/ Information Resources Management Association, editor.
其他題名:
concepts, methodologies, tools, and applications /
出版者:
Hershey, Pennsylvania :IGI Global, : 2020.,
面頁冊數:
1 online resource (3 v.)
內容註:
Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Internet of things and security perspectives: current issues and trends ; Chapter 2. Technopsychology of IoT optimization in the business world ; Chapter 3. Security in application layer protocols of IoT: threats and attacks ; Chapter 4. Basic concepts of internet of things and game theory ; Chapter 5. Internet of Things in real life: applications ; Chapter 6. Mobile malware -- Section 2. Development and design methodologies. Chapter 7. Framework for threat analysis and attack modelling of network security protocols ; Chapter 8. Security in mission critical communication systems: approach for intrusion detection ; Chapter 9. An approach to designing IoT-based business models ; Chapter 10. Microsense: sensor framework for IoT system-on-chip ; Chapter 11. Security in network layer of IoT: possible measures to preclude ; Chapter 12. Towards autonomous IoT logistics objects ; Chapter 13. IoT architecture ; Chapter 14. A trusted ubiquitous healthcare monitoring system for hospital environment ; Chapter 15. Fault-recovery and coherence in Internet of Things choreographies ; Chapter 16. Innovative approach for improving intrusion detection using genetic algorithm with layered approach ; Chapter 17. Novel intrusion detection mechanism with low overhead for SCADA systems ; Chapter 18. A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) ; Chapter 19. Effective integration of reliable routing mechanism and energy efficient node placement technique for low power IoT networks ; Chapter 20. Mathematical representation of quality of service (qos) parameters for Internet of Things (IoT) ; Chapter 21. Making IoT run: opportunities and challenges for manufacturing companies ; Chapter 22. Trust management model based on fuzzy approach for ubiquitous computing ; Chapter 23. A location-aware architecture for an IoT-based smart museum -- Section 3. Tools and technologies. Chapter 24. The conceptual and architectural Design of an intelligent intrusion detection system ; Chapter 25. Agents for intrusion detection in MANET: a survey and analysis ; Chapter 26. Intrusion detection system (IDS) and their types ; Chapter 27. Mechanisms to secure communications in the IoT ; Chapter 28. An optimal routing algorithm for Internet of Things enabling technologies ; Chapter 29. Agent based noise detection using real time data analysis towards green environment -- Volume II. Chapter 30. Data mining techniques for distributed denial of service attacks detection in the Internet of Things: a research survey ; Chapter 31. An architecture to implement the Internet-of-Things using the prometheus methodology ; Chapter 32. I-BAT: a data-intensive solution based on the Internet of Things to predict energy behaviors in microgrids ; Chapter 33. Internet of things service provisioning platform for cross-application cooperation ; Chapter 34. IoT setup for co-measurement of water level and temperature ; Chapter 35. Data mining analytics for crime security investigation and intrusion detection ; Chapter 36. Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks ; Chapter 37. Reliability of IoT-aware BPMN healthcare processes ; Chapter 38. Detection protocol of possible crime scenes using Internet of Things (IoT) ; Chapter 39. Securing financial XML transactions using intelligent fuzzy classification techniques: a smart fuzzy-based model for financial XML transactions security using XML encryption ; Chapter 40. An approach based on social bees for an intrusion detection system by scenario ; Chapter 41. A new image encryption method based on improved cipher block chaining with optimization technique ; Chapter 42. Energy harvesting methods for Internet of Things ; Chapter 43. SEMDPA: a semantic web crossroad architecture for wsns in the Internet of Things ; Chapter 44. Internet of things (IOT) solution for increasing the quality of life of physically challenged people ; Chapter 45. Networked wireless sensors, active RFID, and handheld devices for modern car park management: WSN, RFID, and mob devs for car park management ; Chapter 46. Cellular IoT for mobile autonomous reporting in the smart grid ; Chapter 47. Hierarchal fuzzy logic controller and internet of things (IoT) information: disease spreading as a test case -- Section 4. Utilization and applications. Chapter 48. Converging technologies for the IoT: standardization activities and frameworks ; Chapter 49. Big data analysis and implementation in different areas using IoT ; Chapter 50. Protecting data confidentiality in the cloud of things ; Chapter 51. The human-IoT ecosystem: an approach to functional situation context classification ; Chapter 52. IoT and cloud computing: the architecture of microcloud-based IoT infrastructure management system ; Chapter 53. Exploring secure computing for the Internet of Things, Internet of Everything, Web of Things, and hyperconnectivity -- Volume III. Chapter 54. Review of discussions on Internet of Things (IoT): insights from Twitter analytics ; Chapter 55. Cognitive Internet of Everything (CIoE): state of the art and approaches ; Chapter 56. Innovation in product ddesign: IoT objects driven new product innovation and prototyping using 3D printers ; Chapter 57. Applying security to a big stream cloud architecture for the Internet of Things ; Chapter 58. Intrusion prevention system ; Chapter 59. Anonymous pico-payments for Internet of Things ; Chapter 60. Hybrid intrusion detection framework for ad hoc networks ; Chapter 61. Energy aware cluster head selection for maximizing lifetime improvement in Internet of Things ; Chapter 62. An approach to data annotation for Internet of Things ; Chapter 63. IoT for hospitality industry: paperless buffet management ; Chapter 64. IoT-based big data: from smart city towards next generation super city planning ; Chapter 65. Defensive mechanism against ddos attack to preserve resource availability for IoT applications ; Chapter 66. An approach of role updating in context-aware role mining ; Chapter 67. Ontology-driven situation assessment system design and development in IoT domains ; Chapter 68. Semantic approach to opening museum collections of everyday life history for services in Internet of Things environments ; Chapter 69. IoT based agriculture as a cloud and big data service: the beginning of digital India -- Section 5. Organizational and social implications. Chapter 70. From ubiquitous computing to the Internet of Things ; Chapter 71. The Internet of Things (IoT): capabilities and applications for smart supply chain ; Chapter 72. IoT in healthcare: breaching security issues ; Chapter 73. Actors in the emerging Internet of Things ecosystems ; Chapter 74. Security aspects in utility computing ; Chapter 75. Smart refrigerator with recipe assistance ; Chapter 76. Malicious data stream identification to improve the resource elasticity of handheld edge computing system -- Section 6. Critical issues and challenges. Chapter 77. Open source software in the Arab world: a literature survey ; Chapter 78. A literature review of the emerging field of IoT using RFID and its applications in supply chain management ; Chapter 79. Cybersecurity concerns in international business ; Chapter 80. Incorporating spatial queries into semantic sensor streams on the Internet of Things -- Section 7. Emerging trends. Chapter 81. The internet of things and beyond: rise of the non-human actors ; Chapter 82. Advancing personal learning using the Internet of Things: creating bonds for societal inclusivity ; Chapter 83. Intercloud: delivering innovative cloud services ; Chapter 84. The blockchain technology: applications and threats ; Chapter 85. Trust-based security mechanisms for self-organized networks (SONs).
標題:
Internet of things - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9866-4
ISBN:
9781522598671 (ebk.)
Securing the Internet of Things = concepts, methodologies, tools, and applications /
Securing the Internet of Things
concepts, methodologies, tools, and applications /[electronic resource] :Information Resources Management Association, editor. - Hershey, Pennsylvania :IGI Global,2020. - 1 online resource (3 v.)
Includes bibliographical references and index.
Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Internet of things and security perspectives: current issues and trends ; Chapter 2. Technopsychology of IoT optimization in the business world ; Chapter 3. Security in application layer protocols of IoT: threats and attacks ; Chapter 4. Basic concepts of internet of things and game theory ; Chapter 5. Internet of Things in real life: applications ; Chapter 6. Mobile malware -- Section 2. Development and design methodologies. Chapter 7. Framework for threat analysis and attack modelling of network security protocols ; Chapter 8. Security in mission critical communication systems: approach for intrusion detection ; Chapter 9. An approach to designing IoT-based business models ; Chapter 10. Microsense: sensor framework for IoT system-on-chip ; Chapter 11. Security in network layer of IoT: possible measures to preclude ; Chapter 12. Towards autonomous IoT logistics objects ; Chapter 13. IoT architecture ; Chapter 14. A trusted ubiquitous healthcare monitoring system for hospital environment ; Chapter 15. Fault-recovery and coherence in Internet of Things choreographies ; Chapter 16. Innovative approach for improving intrusion detection using genetic algorithm with layered approach ; Chapter 17. Novel intrusion detection mechanism with low overhead for SCADA systems ; Chapter 18. A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) ; Chapter 19. Effective integration of reliable routing mechanism and energy efficient node placement technique for low power IoT networks ; Chapter 20. Mathematical representation of quality of service (qos) parameters for Internet of Things (IoT) ; Chapter 21. Making IoT run: opportunities and challenges for manufacturing companies ; Chapter 22. Trust management model based on fuzzy approach for ubiquitous computing ; Chapter 23. A location-aware architecture for an IoT-based smart museum -- Section 3. Tools and technologies. Chapter 24. The conceptual and architectural Design of an intelligent intrusion detection system ; Chapter 25. Agents for intrusion detection in MANET: a survey and analysis ; Chapter 26. Intrusion detection system (IDS) and their types ; Chapter 27. Mechanisms to secure communications in the IoT ; Chapter 28. An optimal routing algorithm for Internet of Things enabling technologies ; Chapter 29. Agent based noise detection using real time data analysis towards green environment -- Volume II. Chapter 30. Data mining techniques for distributed denial of service attacks detection in the Internet of Things: a research survey ; Chapter 31. An architecture to implement the Internet-of-Things using the prometheus methodology ; Chapter 32. I-BAT: a data-intensive solution based on the Internet of Things to predict energy behaviors in microgrids ; Chapter 33. Internet of things service provisioning platform for cross-application cooperation ; Chapter 34. IoT setup for co-measurement of water level and temperature ; Chapter 35. Data mining analytics for crime security investigation and intrusion detection ; Chapter 36. Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks ; Chapter 37. Reliability of IoT-aware BPMN healthcare processes ; Chapter 38. Detection protocol of possible crime scenes using Internet of Things (IoT) ; Chapter 39. Securing financial XML transactions using intelligent fuzzy classification techniques: a smart fuzzy-based model for financial XML transactions security using XML encryption ; Chapter 40. An approach based on social bees for an intrusion detection system by scenario ; Chapter 41. A new image encryption method based on improved cipher block chaining with optimization technique ; Chapter 42. Energy harvesting methods for Internet of Things ; Chapter 43. SEMDPA: a semantic web crossroad architecture for wsns in the Internet of Things ; Chapter 44. Internet of things (IOT) solution for increasing the quality of life of physically challenged people ; Chapter 45. Networked wireless sensors, active RFID, and handheld devices for modern car park management: WSN, RFID, and mob devs for car park management ; Chapter 46. Cellular IoT for mobile autonomous reporting in the smart grid ; Chapter 47. Hierarchal fuzzy logic controller and internet of things (IoT) information: disease spreading as a test case -- Section 4. Utilization and applications. Chapter 48. Converging technologies for the IoT: standardization activities and frameworks ; Chapter 49. Big data analysis and implementation in different areas using IoT ; Chapter 50. Protecting data confidentiality in the cloud of things ; Chapter 51. The human-IoT ecosystem: an approach to functional situation context classification ; Chapter 52. IoT and cloud computing: the architecture of microcloud-based IoT infrastructure management system ; Chapter 53. Exploring secure computing for the Internet of Things, Internet of Everything, Web of Things, and hyperconnectivity -- Volume III. Chapter 54. Review of discussions on Internet of Things (IoT): insights from Twitter analytics ; Chapter 55. Cognitive Internet of Everything (CIoE): state of the art and approaches ; Chapter 56. Innovation in product ddesign: IoT objects driven new product innovation and prototyping using 3D printers ; Chapter 57. Applying security to a big stream cloud architecture for the Internet of Things ; Chapter 58. Intrusion prevention system ; Chapter 59. Anonymous pico-payments for Internet of Things ; Chapter 60. Hybrid intrusion detection framework for ad hoc networks ; Chapter 61. Energy aware cluster head selection for maximizing lifetime improvement in Internet of Things ; Chapter 62. An approach to data annotation for Internet of Things ; Chapter 63. IoT for hospitality industry: paperless buffet management ; Chapter 64. IoT-based big data: from smart city towards next generation super city planning ; Chapter 65. Defensive mechanism against ddos attack to preserve resource availability for IoT applications ; Chapter 66. An approach of role updating in context-aware role mining ; Chapter 67. Ontology-driven situation assessment system design and development in IoT domains ; Chapter 68. Semantic approach to opening museum collections of everyday life history for services in Internet of Things environments ; Chapter 69. IoT based agriculture as a cloud and big data service: the beginning of digital India -- Section 5. Organizational and social implications. Chapter 70. From ubiquitous computing to the Internet of Things ; Chapter 71. The Internet of Things (IoT): capabilities and applications for smart supply chain ; Chapter 72. IoT in healthcare: breaching security issues ; Chapter 73. Actors in the emerging Internet of Things ecosystems ; Chapter 74. Security aspects in utility computing ; Chapter 75. Smart refrigerator with recipe assistance ; Chapter 76. Malicious data stream identification to improve the resource elasticity of handheld edge computing system -- Section 6. Critical issues and challenges. Chapter 77. Open source software in the Arab world: a literature survey ; Chapter 78. A literature review of the emerging field of IoT using RFID and its applications in supply chain management ; Chapter 79. Cybersecurity concerns in international business ; Chapter 80. Incorporating spatial queries into semantic sensor streams on the Internet of Things -- Section 7. Emerging trends. Chapter 81. The internet of things and beyond: rise of the non-human actors ; Chapter 82. Advancing personal learning using the Internet of Things: creating bonds for societal inclusivity ; Chapter 83. Intercloud: delivering innovative cloud services ; Chapter 84. The blockchain technology: applications and threats ; Chapter 85. Trust-based security mechanisms for self-organized networks (SONs).
"This book examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. It highlights a range of topics such as cloud security, threat detection, and open source software"--
ISBN: 9781522598671 (ebk.)Subjects--Topical Terms:
3217048
Internet of things
--Security measures.
LC Class. No.: TK5105.8857 / .S39 2020
Dewey Class. No.: 005.8
Securing the Internet of Things = concepts, methodologies, tools, and applications /
LDR
:09090nmm a2200253 a 4500
001
2246885
003
IGIG
005
20211018133958.0
006
m o d
007
cr cn
008
211227s2020 pau fob 001 0 eng d
020
$a
9781522598671 (ebk.)
020
$a
9781522598664 (hbk.)
035
$a
(OCoLC)1112159905
035
$a
1101012241
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.8857
$b
.S39 2020
082
0 0
$a
005.8
$2
23
245
0 0
$a
Securing the Internet of Things
$h
[electronic resource] :
$b
concepts, methodologies, tools, and applications /
$c
Information Resources Management Association, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2020.
300
$a
1 online resource (3 v.)
504
$a
Includes bibliographical references and index.
505
0
$a
Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Internet of things and security perspectives: current issues and trends ; Chapter 2. Technopsychology of IoT optimization in the business world ; Chapter 3. Security in application layer protocols of IoT: threats and attacks ; Chapter 4. Basic concepts of internet of things and game theory ; Chapter 5. Internet of Things in real life: applications ; Chapter 6. Mobile malware -- Section 2. Development and design methodologies. Chapter 7. Framework for threat analysis and attack modelling of network security protocols ; Chapter 8. Security in mission critical communication systems: approach for intrusion detection ; Chapter 9. An approach to designing IoT-based business models ; Chapter 10. Microsense: sensor framework for IoT system-on-chip ; Chapter 11. Security in network layer of IoT: possible measures to preclude ; Chapter 12. Towards autonomous IoT logistics objects ; Chapter 13. IoT architecture ; Chapter 14. A trusted ubiquitous healthcare monitoring system for hospital environment ; Chapter 15. Fault-recovery and coherence in Internet of Things choreographies ; Chapter 16. Innovative approach for improving intrusion detection using genetic algorithm with layered approach ; Chapter 17. Novel intrusion detection mechanism with low overhead for SCADA systems ; Chapter 18. A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) ; Chapter 19. Effective integration of reliable routing mechanism and energy efficient node placement technique for low power IoT networks ; Chapter 20. Mathematical representation of quality of service (qos) parameters for Internet of Things (IoT) ; Chapter 21. Making IoT run: opportunities and challenges for manufacturing companies ; Chapter 22. Trust management model based on fuzzy approach for ubiquitous computing ; Chapter 23. A location-aware architecture for an IoT-based smart museum -- Section 3. Tools and technologies. Chapter 24. The conceptual and architectural Design of an intelligent intrusion detection system ; Chapter 25. Agents for intrusion detection in MANET: a survey and analysis ; Chapter 26. Intrusion detection system (IDS) and their types ; Chapter 27. Mechanisms to secure communications in the IoT ; Chapter 28. An optimal routing algorithm for Internet of Things enabling technologies ; Chapter 29. Agent based noise detection using real time data analysis towards green environment -- Volume II. Chapter 30. Data mining techniques for distributed denial of service attacks detection in the Internet of Things: a research survey ; Chapter 31. An architecture to implement the Internet-of-Things using the prometheus methodology ; Chapter 32. I-BAT: a data-intensive solution based on the Internet of Things to predict energy behaviors in microgrids ; Chapter 33. Internet of things service provisioning platform for cross-application cooperation ; Chapter 34. IoT setup for co-measurement of water level and temperature ; Chapter 35. Data mining analytics for crime security investigation and intrusion detection ; Chapter 36. Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks ; Chapter 37. Reliability of IoT-aware BPMN healthcare processes ; Chapter 38. Detection protocol of possible crime scenes using Internet of Things (IoT) ; Chapter 39. Securing financial XML transactions using intelligent fuzzy classification techniques: a smart fuzzy-based model for financial XML transactions security using XML encryption ; Chapter 40. An approach based on social bees for an intrusion detection system by scenario ; Chapter 41. A new image encryption method based on improved cipher block chaining with optimization technique ; Chapter 42. Energy harvesting methods for Internet of Things ; Chapter 43. SEMDPA: a semantic web crossroad architecture for wsns in the Internet of Things ; Chapter 44. Internet of things (IOT) solution for increasing the quality of life of physically challenged people ; Chapter 45. Networked wireless sensors, active RFID, and handheld devices for modern car park management: WSN, RFID, and mob devs for car park management ; Chapter 46. Cellular IoT for mobile autonomous reporting in the smart grid ; Chapter 47. Hierarchal fuzzy logic controller and internet of things (IoT) information: disease spreading as a test case -- Section 4. Utilization and applications. Chapter 48. Converging technologies for the IoT: standardization activities and frameworks ; Chapter 49. Big data analysis and implementation in different areas using IoT ; Chapter 50. Protecting data confidentiality in the cloud of things ; Chapter 51. The human-IoT ecosystem: an approach to functional situation context classification ; Chapter 52. IoT and cloud computing: the architecture of microcloud-based IoT infrastructure management system ; Chapter 53. Exploring secure computing for the Internet of Things, Internet of Everything, Web of Things, and hyperconnectivity -- Volume III. Chapter 54. Review of discussions on Internet of Things (IoT): insights from Twitter analytics ; Chapter 55. Cognitive Internet of Everything (CIoE): state of the art and approaches ; Chapter 56. Innovation in product ddesign: IoT objects driven new product innovation and prototyping using 3D printers ; Chapter 57. Applying security to a big stream cloud architecture for the Internet of Things ; Chapter 58. Intrusion prevention system ; Chapter 59. Anonymous pico-payments for Internet of Things ; Chapter 60. Hybrid intrusion detection framework for ad hoc networks ; Chapter 61. Energy aware cluster head selection for maximizing lifetime improvement in Internet of Things ; Chapter 62. An approach to data annotation for Internet of Things ; Chapter 63. IoT for hospitality industry: paperless buffet management ; Chapter 64. IoT-based big data: from smart city towards next generation super city planning ; Chapter 65. Defensive mechanism against ddos attack to preserve resource availability for IoT applications ; Chapter 66. An approach of role updating in context-aware role mining ; Chapter 67. Ontology-driven situation assessment system design and development in IoT domains ; Chapter 68. Semantic approach to opening museum collections of everyday life history for services in Internet of Things environments ; Chapter 69. IoT based agriculture as a cloud and big data service: the beginning of digital India -- Section 5. Organizational and social implications. Chapter 70. From ubiquitous computing to the Internet of Things ; Chapter 71. The Internet of Things (IoT): capabilities and applications for smart supply chain ; Chapter 72. IoT in healthcare: breaching security issues ; Chapter 73. Actors in the emerging Internet of Things ecosystems ; Chapter 74. Security aspects in utility computing ; Chapter 75. Smart refrigerator with recipe assistance ; Chapter 76. Malicious data stream identification to improve the resource elasticity of handheld edge computing system -- Section 6. Critical issues and challenges. Chapter 77. Open source software in the Arab world: a literature survey ; Chapter 78. A literature review of the emerging field of IoT using RFID and its applications in supply chain management ; Chapter 79. Cybersecurity concerns in international business ; Chapter 80. Incorporating spatial queries into semantic sensor streams on the Internet of Things -- Section 7. Emerging trends. Chapter 81. The internet of things and beyond: rise of the non-human actors ; Chapter 82. Advancing personal learning using the Internet of Things: creating bonds for societal inclusivity ; Chapter 83. Intercloud: delivering innovative cloud services ; Chapter 84. The blockchain technology: applications and threats ; Chapter 85. Trust-based security mechanisms for self-organized networks (SONs).
520
3
$a
"This book examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. It highlights a range of topics such as cloud security, threat detection, and open source software"--
$c
Provided by publisher.
650
0
$a
Internet of things
$x
Security measures.
$3
3217048
710
1
$a
Information Resources Management Association,
$e
editor.
$3
3208430
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9866-4
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9407256
電子資源
11.線上閱覽_V
電子書
EB TK5105.8857 .S39 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入