Internet of Things security and privacy: practical and management perspectives
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperat...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton
CRC Press, Taylor & Francis Group
2024
|
Ausgabe: | First edition |
Schlagworte: | |
Online-Zugang: | Taylor & Francis eBooks on EBSCOhost |
Zusammenfassung: | The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems. The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course |
Beschreibung: | xix, 238 Seiten Illustrationen, Diagramme |
ISBN: | 1003199410 9781032058306 1003810187 9781032057712 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049491052 | ||
003 | DE-604 | ||
005 | 20240613 | ||
007 | t | ||
008 | 240109s2024 a||| |||| 00||| eng d | ||
020 | |a 1003199410 |9 1-003-19941-0 | ||
020 | |a 9781032058306 |c pbk |9 978-1-032-05830-6 | ||
020 | |a 1003810187 |9 1-003-81018-7 | ||
020 | |a 9781032057712 |9 978-1-032-05771-2 | ||
020 | |z 9781032067712 |9 978-1-032-06771-2 | ||
035 | |a (DE-599)BVBBV049491052 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-M382 | ||
245 | 1 | 0 | |a Internet of Things security and privacy |b practical and management perspectives |c edited by Ali Ismail Awad [und 3 weitere] |
250 | |a First edition | ||
264 | 1 | |a Boca Raton |b CRC Press, Taylor & Francis Group |c 2024 | |
300 | |a xix, 238 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
505 | 8 | |a Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush | |
520 | 3 | |a The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems. The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course | |
653 | 0 | |a Internet of things | |
653 | 0 | |a Computer security | |
653 | 0 | |a Internet des objets | |
653 | 0 | |a Sécurité informatique | |
653 | 0 | |a TECHNOLOGY / Electricity | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Awad, Ali Ismail |0 (DE-588)1091567212 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |a 978-1-003-19941-0 |
856 | 4 | 0 | |u https://www.taylorfrancis.com/books/9781003199410 |3 Taylor & Francis |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3711693 |3 eBooks on EBSCOhost |
Datensatz im Suchindex
_version_ | 1805077093276450816 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Awad, Ali Ismail |
author2 | Awad, Ali Ismail |
author2_role | edt |
author2_variant | a i a ai aia |
author_GND | (DE-588)1091567212 |
author_facet | Awad, Ali Ismail Awad, Ali Ismail |
author_role | aut |
author_sort | Awad, Ali Ismail |
author_variant | a i a ai aia |
building | Verbundindex |
bvnumber | BV049491052 |
contents | Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush |
ctrlnum | (DE-599)BVBBV049491052 |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049491052</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240613</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240109s2024 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003199410</subfield><subfield code="9">1-003-19941-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032058306</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-032-05830-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003810187</subfield><subfield code="9">1-003-81018-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032057712</subfield><subfield code="9">978-1-032-05771-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781032067712</subfield><subfield code="9">978-1-032-06771-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049491052</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet of Things security and privacy</subfield><subfield code="b">practical and management perspectives</subfield><subfield code="c">edited by Ali Ismail Awad [und 3 weitere]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xix, 238 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems. The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet des objets</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">TECHNOLOGY / Electricity</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Awad, Ali Ismail</subfield><subfield code="0">(DE-588)1091567212</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="a">978-1-003-19941-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.taylorfrancis.com/books/9781003199410</subfield><subfield code="3">Taylor & Francis</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3711693</subfield><subfield code="3">eBooks on EBSCOhost</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV049491052 |
illustrated | Illustrated |
index_date | 2024-07-03T23:19:43Z |
indexdate | 2024-07-20T06:07:42Z |
institution | BVB |
isbn | 1003199410 9781032058306 1003810187 9781032057712 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034836361 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | xix, 238 Seiten Illustrationen, Diagramme |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
spelling | Internet of Things security and privacy practical and management perspectives edited by Ali Ismail Awad [und 3 weitere] First edition Boca Raton CRC Press, Taylor & Francis Group 2024 xix, 238 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems. The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course Internet of things Computer security Internet des objets Sécurité informatique TECHNOLOGY / Electricity (DE-588)4143413-4 Aufsatzsammlung gnd-content Awad, Ali Ismail (DE-588)1091567212 edt Erscheint auch als Online-Ausgabe 978-1-003-19941-0 https://www.taylorfrancis.com/books/9781003199410 Taylor & Francis https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3711693 eBooks on EBSCOhost |
spellingShingle | Awad, Ali Ismail Internet of Things security and privacy practical and management perspectives Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush |
subject_GND | (DE-588)4143413-4 |
title | Internet of Things security and privacy practical and management perspectives |
title_auth | Internet of Things security and privacy practical and management perspectives |
title_exact_search | Internet of Things security and privacy practical and management perspectives |
title_exact_search_txtP | Internet of Things security and privacy practical and management perspectives |
title_full | Internet of Things security and privacy practical and management perspectives edited by Ali Ismail Awad [und 3 weitere] |
title_fullStr | Internet of Things security and privacy practical and management perspectives edited by Ali Ismail Awad [und 3 weitere] |
title_full_unstemmed | Internet of Things security and privacy practical and management perspectives edited by Ali Ismail Awad [und 3 weitere] |
title_short | Internet of Things security and privacy |
title_sort | internet of things security and privacy practical and management perspectives |
title_sub | practical and management perspectives |
topic_facet | Aufsatzsammlung |
url | https://www.taylorfrancis.com/books/9781003199410 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3711693 |
work_keys_str_mv | AT awadaliismail internetofthingssecurityandprivacypracticalandmanagementperspectives |