000 | 05652nam a2200709 i 4500 | ||
---|---|---|---|
001 | 7753052 | ||
003 | IEEE | ||
005 | 20220712205939.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 170210s2016 nju ob 001 eng d | ||
020 |
_a9781119193784 _qelectronic bk. |
||
020 |
_z9781119193869 _qprint |
||
020 |
_z1119193788 _qelectronic bk. |
||
020 |
_z9781119193883 _qelectronic bk. |
||
020 |
_z1119193885 _qelectronic bk. |
||
020 |
_z9781119193876 _qelectronic bk. |
||
020 |
_z1119193877 _qelectronic bk. |
||
024 | 7 |
_a10.1002/9781119193784 _2doi |
|
035 | _a(CaBNVSL)mat07753052 | ||
035 | _a(IDAMS)0b0000648585c68f | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 | _aTK5105.8857 | |
082 | 0 | 4 |
_a004.67/8 _223 |
245 | 0 | 0 |
_aCyber-assurance for the internet of things / _cedited by Tyson T. Brooks. |
264 | 1 |
_aHoboken, New Jersey : _bWiley : _bIEEE Press, _c[2017] |
|
264 | 2 |
_a[Piscataqay, New Jersey] : _bIEEE Xplore, _c[2016] |
|
300 | _a1 PDF (520 pages). | ||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aEmbedded Design Security. Certified Security by Design for the Internet of Things / Shiu-Kai Chin -- Cyber-Assurance Through Embedded Security for the Internet of Things / Tyson T Brooks, Joon Park -- A Secure Update Mechanism for Internet of Things Devices / Martin Goldberg -- Trust Impact. Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective / M Bala Krishna -- The Impact of IoT Devices on Network Trust Boundaries / Nicole Newmeyer -- Wearable Automation Provenance. Wearable IoT Computing: Interface, Emotions, Wearer'S Culture, and Security/Privacy Concerns / Robert Mccloud, Martha Lerski, Joon Park, Tyson T Brooks -- On Vulnerabilities of IoT-Based Consumer-Oriented Closed-Loop Control Automation Systems / Martin Murillo -- Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety / Mark Underwood -- Cloud Artificial Intelligence Cyber-Physical Systems. A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture / Tyson T Brooks, Lee McKnight -- An Artificial Intelligence Perspective on Ensuring Cyber-Assurance for the Internet of Things / Utku Kose -- Perceived Threat Modeling for Cyber-Physical Systems / Christopher Leberknight. | |
506 | 1 | _aRestricted to subscribers or individual electronic text purchasers. | |
520 | _aPresents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. . Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications. Aids readers in understanding how to design and build cyber-assurance into the IoT. Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance. Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking. | ||
530 | _aAlso available in print. | ||
538 | _aMode of access: World Wide Web | ||
588 | _aOnline resource; title from PDF title page (John Wiley, viewed December 29, 2016). | ||
650 | 0 |
_aInternet of things _xSecurity measures. _96353 |
|
655 | 4 |
_aElectronic books. _93294 |
|
695 | _aActuators | ||
695 | _aAutomation | ||
695 | _aComputer architecture | ||
695 | _aCyber-physical systems | ||
695 | _aFloods | ||
695 | _aHydroelectric power generation | ||
695 | _aInformation technology | ||
695 | _aInternet | ||
695 | _aIntrusion detection | ||
695 | _aMarine animals | ||
695 | _aProcess control | ||
695 | _aProtocols | ||
695 | _aReservoirs | ||
695 | _aRivers | ||
695 | _aSoftware systems | ||
700 | 1 |
_aBrooks, Tyson T. _eeditor. _928973 |
|
710 | 2 |
_aIEEE Xplore (Online Service), _edistributor. _928974 |
|
710 | 2 |
_aWiley, _epublisher. _928975 |
|
776 | 0 | 8 |
_iPrint version: _z9781119193869 |
856 | 4 | 2 |
_3Abstract with links to resource _uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7753052 |
942 | _cEBK | ||
999 |
_c74478 _d74478 |