000 | 03647cam a2200553Ki 4500 | ||
---|---|---|---|
001 | 9781003127598 | ||
003 | FlBoTFG | ||
005 | 20220711212113.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 210913s2021 xx eo 000 0 eng d | ||
040 |
_aOCoLC-P _beng _erda _epn _cOCoLC-P |
||
020 |
_a9781003127598 _q(electronic bk.) |
||
020 |
_a1003127592 _q(electronic bk.) |
||
020 | _z9780367650513 | ||
020 |
_a9781000422474 _q(electronic bk. : EPUB) |
||
020 |
_a100042247X _q(electronic bk. : EPUB) |
||
020 |
_a9781000421729 _q(electronic bk. : PDF) |
||
020 |
_a1000421724 _q(electronic bk. : PDF) |
||
020 | _z9780367650490 | ||
035 | _a(OCoLC)1267989638 | ||
035 | _a(OCoLC-P)1267989638 | ||
050 | 4 | _aTK5105.8857 | |
072 | 7 |
_aCOM _x091000 _2bisacsh |
|
072 | 7 |
_aCOM _x021030 _2bisacsh |
|
072 | 7 |
_aCOM _x059000 _2bisacsh |
|
072 | 7 |
_aUB _2bicssc |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 0 | 0 |
_aSecurity of Internet of Things Nodes : _bChallenges, Attacks, and Countermeasures. |
250 | _aFirst edition. | ||
264 | 1 |
_a[Place of publication not identified] : _bChapman and Hall/CRC, _c2021. |
|
300 | _a1 online resource (xii, 308 pages). | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 0 | _aChapman & Hall CRC internet of things | |
505 | 0 | _aSecuring Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number Generator for IoT devices using Memristor. Secured Testing of AES Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication for IoT Enabled Devices and Applications. An improved verification scheme based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the Edge Nodes of IoT System. Lightweight Security solutions for IoT using Physical Layer Key Generation. Threat and attack models in IoT devices. Review on Hardware attacks and security challenges in IoT Edge nodes. Study of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling and Attack Analysis for IoT Applications. Trust management in Internet of Things devices | |
520 | _aThe book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 7 |
_aCOMPUTERS / Database Management / Data Mining _2bisacsh _912290 |
|
650 | 7 |
_aCOMPUTERS / Computer Engineering _2bisacsh _94770 |
|
650 | 0 |
_aInternet of things _xSecurity measures. _96353 |
|
700 | 1 |
_aChakraborty, Chinmay, _d1984- _eeditor. _913165 |
|
700 | 1 |
_aRajendran, Sree Ranjani, _eeditor. _913166 |
|
700 | 1 |
_aRehman, Muhammad Habibur, _eeditor. _913167 |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003127598 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 | _cEBK | ||
999 |
_c70380 _d70380 |