Detecting and mitigating robotic cyber security risks:
"[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this bo...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2017]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts"--Provided by publisher. |
Beschreibung: | PDFs (384 pages) : illustrations. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522521556 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00172432 | ||
003 | IGIG | ||
005 | 20170330143725.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 170327s2017 paua fob 001 0 eng d | ||
020 | |a 9781522521556 |q electronic | ||
020 | |z 9781522521549 |q print | ||
024 | 7 | |a 10.4018/978-1-5225-2154-9 |2 doi | |
035 | |a (CaBNVSL)gtp00566995 | ||
035 | |a (OCoLC)974370062 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .D48 2017e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Detecting and mitigating robotic cyber security risks |c Raghavendra Kumar, Prasant Kumar Pattnaik and Priyanka Pandey [editors]. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2017] | |
300 | |a PDFs (384 pages) : |b illustrations. | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a A survey: vulnerabilities present in PDF files / Sakshi Gupta, Yogita Gigras -- A practical approach of network simulation / Ratish Agarwal, Piyush Kumar Shukla, Sachin Goyal -- Hindi optical character recognition and its applications / Rashmi Gupta [and 3 others] -- Android permissions: attacks and controls / Prachi, Arushi Jain -- Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human / Preeti Mulay, Krishnal Patel, Hecto Gomez Gauchia -- A survey: threats and vulnerabilities in cloud / Srishti Sharma, Yogita Gigras -- Digital signature schemes based on two hard problems / A. B. Nimbalkar, C. G. Desai -- Cloud auditor loyalty checking process using dual signature / Divya Thakur -- Cloud security using 2-factor image authentication technique / Ratish Agarwal, Anjana Pandey, Mahesh Pawar -- Utilizing soft computing application for QOS and security optimization by meta-heuristic-based genetic approach / Sherin Zafar -- Cyber crime and cyber security: a quick glance / Aruna Devi -- Pragmatic solutions to cyber security threat in Indian context / Cosmena Mahapatra -- Role of cyber security in today's scenario / Manju Khari [and 3 others] -- Exploring cyber security vulnerabilities in the age of IoT / Shruti Kohli -- An approach towards survey and analysis of cloud robotics / Akash Chowdhury, Swastik Mukherjee, Sourav Banerjee -- Mobile robotics / Isak Karabegovic, Vlatko Dolecek -- | |
505 | 8 | |a Cloud robotics: robot rides on the cloud - architecture, applications, and challenges / K. Saravanan -- Intelligent agents and autonomous robots / Deepshikha Bhargava -- Survey of recent cyber security attacks on robotic systems and their mitigation approaches / Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman -- Mobile agent communication, security concerns, and approaches: an insight into different kinds of vulnerabilities a mobile agent could be subjected to and measures to control them / Kamat Pooja, Gite Shilpa, Patil Shruti -- Cloud and cyber security through crypt-iris-based authentication approach / Sherin Zafar -- Cyber security risks in robotics / Ishaani Priyadarshini. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/28/2017). | ||
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Mobile computing |x Security measures. | |
650 | 0 | |a Robots |x Control systems |x Security measures. | |
653 | |a Authentication techniques | ||
653 | |a Cloud robotics | ||
653 | |a Cyber physical system | ||
653 | |a Mobile robotics | ||
653 | |a Network simulation | ||
700 | 1 | |a Kumar, Raghavendra, |e editor. | |
700 | 1 | |a Pandey, Priyanka, |e editor. | |
700 | 1 | |a Pattnaik, Prasant Kumar, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1522521542 |z 9781522521549 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00172432 |
---|---|
_version_ | 1816797078137864192 |
adam_text | |
any_adam_object | |
author2 | Kumar, Raghavendra Pandey, Priyanka Pattnaik, Prasant Kumar |
author2_role | edt edt edt |
author2_variant | r k rk p p pp p k p pk pkp |
author_facet | Kumar, Raghavendra Pandey, Priyanka Pattnaik, Prasant Kumar |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .D48 2017e |
callnumber-search | TK5105.59 .D48 2017e |
callnumber-sort | TK 45105.59 D48 42017E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | A survey: vulnerabilities present in PDF files / Sakshi Gupta, Yogita Gigras -- A practical approach of network simulation / Ratish Agarwal, Piyush Kumar Shukla, Sachin Goyal -- Hindi optical character recognition and its applications / Rashmi Gupta [and 3 others] -- Android permissions: attacks and controls / Prachi, Arushi Jain -- Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human / Preeti Mulay, Krishnal Patel, Hecto Gomez Gauchia -- A survey: threats and vulnerabilities in cloud / Srishti Sharma, Yogita Gigras -- Digital signature schemes based on two hard problems / A. B. Nimbalkar, C. G. Desai -- Cloud auditor loyalty checking process using dual signature / Divya Thakur -- Cloud security using 2-factor image authentication technique / Ratish Agarwal, Anjana Pandey, Mahesh Pawar -- Utilizing soft computing application for QOS and security optimization by meta-heuristic-based genetic approach / Sherin Zafar -- Cyber crime and cyber security: a quick glance / Aruna Devi -- Pragmatic solutions to cyber security threat in Indian context / Cosmena Mahapatra -- Role of cyber security in today's scenario / Manju Khari [and 3 others] -- Exploring cyber security vulnerabilities in the age of IoT / Shruti Kohli -- An approach towards survey and analysis of cloud robotics / Akash Chowdhury, Swastik Mukherjee, Sourav Banerjee -- Mobile robotics / Isak Karabegovic, Vlatko Dolecek -- Cloud robotics: robot rides on the cloud - architecture, applications, and challenges / K. Saravanan -- Intelligent agents and autonomous robots / Deepshikha Bhargava -- Survey of recent cyber security attacks on robotic systems and their mitigation approaches / Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman -- Mobile agent communication, security concerns, and approaches: an insight into different kinds of vulnerabilities a mobile agent could be subjected to and measures to control them / Kamat Pooja, Gite Shilpa, Patil Shruti -- Cloud and cyber security through crypt-iris-based authentication approach / Sherin Zafar -- Cyber security risks in robotics / Ishaani Priyadarshini. |
ctrlnum | (CaBNVSL)gtp00566995 (OCoLC)974370062 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04656nam a2200529 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00172432</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20170330143725.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">170327s2017 paua fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522521556</subfield><subfield code="q">electronic</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522521549</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-2154-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00566995</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)974370062</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.D48 2017e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Detecting and mitigating robotic cyber security risks </subfield><subfield code="c">Raghavendra Kumar, Prasant Kumar Pattnaik and Priyanka Pandey [editors].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">PDFs (384 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">A survey: vulnerabilities present in PDF files / Sakshi Gupta, Yogita Gigras -- A practical approach of network simulation / Ratish Agarwal, Piyush Kumar Shukla, Sachin Goyal -- Hindi optical character recognition and its applications / Rashmi Gupta [and 3 others] -- Android permissions: attacks and controls / Prachi, Arushi Jain -- Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human / Preeti Mulay, Krishnal Patel, Hecto Gomez Gauchia -- A survey: threats and vulnerabilities in cloud / Srishti Sharma, Yogita Gigras -- Digital signature schemes based on two hard problems / A. B. Nimbalkar, C. G. Desai -- Cloud auditor loyalty checking process using dual signature / Divya Thakur -- Cloud security using 2-factor image authentication technique / Ratish Agarwal, Anjana Pandey, Mahesh Pawar -- Utilizing soft computing application for QOS and security optimization by meta-heuristic-based genetic approach / Sherin Zafar -- Cyber crime and cyber security: a quick glance / Aruna Devi -- Pragmatic solutions to cyber security threat in Indian context / Cosmena Mahapatra -- Role of cyber security in today's scenario / Manju Khari [and 3 others] -- Exploring cyber security vulnerabilities in the age of IoT / Shruti Kohli -- An approach towards survey and analysis of cloud robotics / Akash Chowdhury, Swastik Mukherjee, Sourav Banerjee -- Mobile robotics / Isak Karabegovic, Vlatko Dolecek -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cloud robotics: robot rides on the cloud - architecture, applications, and challenges / K. Saravanan -- Intelligent agents and autonomous robots / Deepshikha Bhargava -- Survey of recent cyber security attacks on robotic systems and their mitigation approaches / Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman -- Mobile agent communication, security concerns, and approaches: an insight into different kinds of vulnerabilities a mobile agent could be subjected to and measures to control them / Kamat Pooja, Gite Shilpa, Patil Shruti -- Cloud and cyber security through crypt-iris-based authentication approach / Sherin Zafar -- Cyber security risks in robotics / Ishaani Priyadarshini.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/28/2017).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Robots</subfield><subfield code="x">Control systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Authentication techniques</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud robotics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber physical system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile robotics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network simulation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Raghavendra,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Priyanka,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pattnaik, Prasant Kumar,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522521542</subfield><subfield code="z">9781522521549</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00172432 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:51:51Z |
institution | BVB |
isbn | 9781522521556 |
language | English |
oclc_num | 974370062 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | PDFs (384 pages) : illustrations. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, |
record_format | marc |
spelling | Detecting and mitigating robotic cyber security risks Raghavendra Kumar, Prasant Kumar Pattnaik and Priyanka Pandey [editors]. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017] PDFs (384 pages) : illustrations. text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. A survey: vulnerabilities present in PDF files / Sakshi Gupta, Yogita Gigras -- A practical approach of network simulation / Ratish Agarwal, Piyush Kumar Shukla, Sachin Goyal -- Hindi optical character recognition and its applications / Rashmi Gupta [and 3 others] -- Android permissions: attacks and controls / Prachi, Arushi Jain -- Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human / Preeti Mulay, Krishnal Patel, Hecto Gomez Gauchia -- A survey: threats and vulnerabilities in cloud / Srishti Sharma, Yogita Gigras -- Digital signature schemes based on two hard problems / A. B. Nimbalkar, C. G. Desai -- Cloud auditor loyalty checking process using dual signature / Divya Thakur -- Cloud security using 2-factor image authentication technique / Ratish Agarwal, Anjana Pandey, Mahesh Pawar -- Utilizing soft computing application for QOS and security optimization by meta-heuristic-based genetic approach / Sherin Zafar -- Cyber crime and cyber security: a quick glance / Aruna Devi -- Pragmatic solutions to cyber security threat in Indian context / Cosmena Mahapatra -- Role of cyber security in today's scenario / Manju Khari [and 3 others] -- Exploring cyber security vulnerabilities in the age of IoT / Shruti Kohli -- An approach towards survey and analysis of cloud robotics / Akash Chowdhury, Swastik Mukherjee, Sourav Banerjee -- Mobile robotics / Isak Karabegovic, Vlatko Dolecek -- Cloud robotics: robot rides on the cloud - architecture, applications, and challenges / K. Saravanan -- Intelligent agents and autonomous robots / Deepshikha Bhargava -- Survey of recent cyber security attacks on robotic systems and their mitigation approaches / Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman -- Mobile agent communication, security concerns, and approaches: an insight into different kinds of vulnerabilities a mobile agent could be subjected to and measures to control them / Kamat Pooja, Gite Shilpa, Patil Shruti -- Cloud and cyber security through crypt-iris-based authentication approach / Sherin Zafar -- Cyber security risks in robotics / Ishaani Priyadarshini. Restricted to subscribers or individual electronic text purchasers. "[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/28/2017). Cloud computing Security measures. Mobile computing Security measures. Robots Control systems Security measures. Authentication techniques Cloud robotics Cyber physical system Mobile robotics Network simulation Kumar, Raghavendra, editor. Pandey, Priyanka, editor. Pattnaik, Prasant Kumar, editor. IGI Global, publisher. Print version: 1522521542 9781522521549 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 Volltext |
spellingShingle | Detecting and mitigating robotic cyber security risks A survey: vulnerabilities present in PDF files / Sakshi Gupta, Yogita Gigras -- A practical approach of network simulation / Ratish Agarwal, Piyush Kumar Shukla, Sachin Goyal -- Hindi optical character recognition and its applications / Rashmi Gupta [and 3 others] -- Android permissions: attacks and controls / Prachi, Arushi Jain -- Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human / Preeti Mulay, Krishnal Patel, Hecto Gomez Gauchia -- A survey: threats and vulnerabilities in cloud / Srishti Sharma, Yogita Gigras -- Digital signature schemes based on two hard problems / A. B. Nimbalkar, C. G. Desai -- Cloud auditor loyalty checking process using dual signature / Divya Thakur -- Cloud security using 2-factor image authentication technique / Ratish Agarwal, Anjana Pandey, Mahesh Pawar -- Utilizing soft computing application for QOS and security optimization by meta-heuristic-based genetic approach / Sherin Zafar -- Cyber crime and cyber security: a quick glance / Aruna Devi -- Pragmatic solutions to cyber security threat in Indian context / Cosmena Mahapatra -- Role of cyber security in today's scenario / Manju Khari [and 3 others] -- Exploring cyber security vulnerabilities in the age of IoT / Shruti Kohli -- An approach towards survey and analysis of cloud robotics / Akash Chowdhury, Swastik Mukherjee, Sourav Banerjee -- Mobile robotics / Isak Karabegovic, Vlatko Dolecek -- Cloud robotics: robot rides on the cloud - architecture, applications, and challenges / K. Saravanan -- Intelligent agents and autonomous robots / Deepshikha Bhargava -- Survey of recent cyber security attacks on robotic systems and their mitigation approaches / Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman -- Mobile agent communication, security concerns, and approaches: an insight into different kinds of vulnerabilities a mobile agent could be subjected to and measures to control them / Kamat Pooja, Gite Shilpa, Patil Shruti -- Cloud and cyber security through crypt-iris-based authentication approach / Sherin Zafar -- Cyber security risks in robotics / Ishaani Priyadarshini. Cloud computing Security measures. Mobile computing Security measures. Robots Control systems Security measures. |
title | Detecting and mitigating robotic cyber security risks |
title_auth | Detecting and mitigating robotic cyber security risks |
title_exact_search | Detecting and mitigating robotic cyber security risks |
title_full | Detecting and mitigating robotic cyber security risks Raghavendra Kumar, Prasant Kumar Pattnaik and Priyanka Pandey [editors]. |
title_fullStr | Detecting and mitigating robotic cyber security risks Raghavendra Kumar, Prasant Kumar Pattnaik and Priyanka Pandey [editors]. |
title_full_unstemmed | Detecting and mitigating robotic cyber security risks Raghavendra Kumar, Prasant Kumar Pattnaik and Priyanka Pandey [editors]. |
title_short | Detecting and mitigating robotic cyber security risks |
title_sort | detecting and mitigating robotic cyber security risks |
topic | Cloud computing Security measures. Mobile computing Security measures. Robots Control systems Security measures. |
topic_facet | Cloud computing Security measures. Mobile computing Security measures. Robots Control systems Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |
work_keys_str_mv | AT kumarraghavendra detectingandmitigatingroboticcybersecurityrisks AT pandeypriyanka detectingandmitigatingroboticcybersecurityrisks AT pattnaikprasantkumar detectingandmitigatingroboticcybersecurityrisks AT igiglobal detectingandmitigatingroboticcybersecurityrisks |