
ISBN13: | 9781032959276 |
ISBN10: | 1032959274 |
Kötéstípus: | Keménykötés |
Terjedelem: | 248 oldal |
Méret: | 234x156 mm |
Nyelv: | angol |
Illusztrációk: | 54 Illustrations, black & white; 38 Halftones, black & white; 16 Line drawings, black & white; 30 Tables, black & white |
700 |
Számítógép architektúrák, logikai tervezés
Számítógépes hálózatok általában
Adatvédelem, adatbiztonság
Számítógépes bűnözés
A számítástechnika biztonsági és egészségügyi vonatkozásai
Büntető jog
Szolgáltatóipar
Az internetről általában
Internetes szolgálatások (online vásárlás, bankolás)
Kriminológia
Recent Advances in Internet of Things Security
GBP 115.00
Kattintson ide a feliratkozáshoz
Recent Advances in Internet of Things Security discusses the critical importance of robust security frameworks to protect Internet of Things ecosystems against various cyber threats. It highlights the security risks associated with Internet of Things devices and applications and present a variety of potential solutions.
The growth of the Internet of Things technology has indeed led to an increase in cybersecurity issues. While Internet of Things enhances accessibility, integrity, availability, scalability, confidentiality, and interoperability among devices, it also faces vulnerabilities due to its diverse attack sources and lack of standardization in security protocols. This makes Internet of Things systems particularly susceptible to cyber-attacks. It's essential to ensure proper security measures are in place to protect Internet of Things devices and networks, given their critical role in modern communication and the evolving threat landscape. Always remember to verify important security information from trusted sources.
Recent Advances in Internet of Things Security discusses the critical importance of robust security frameworks to protect Internet of Things ecosystems against various cyber threats. It highlights the security risks associated with Internet of Things devices and applications and present a variety of potential solutions. It's essential to remain aware of these challenges to effectively safeguard Internet of Things systems. This book delves into the complexities of IoT security, exploring a range of vulnerabilities across different layers of the IoT architecture.
The book provides a comprehensive overview of Internet of Things security, emphasizing the significance of securing Internet of Things products and applications. It serves as a foundational resource for young researchers, academics, and industry professionals keen on advanced security solutions within the Internet of Things landscape, reflecting the current state of research and ongoing challenges in this field.
Chapter 1 Strengthening IIoT Security: Integrating Intrusion Detection Systems with Machine Learning Chapter 2 IoT Anomaly Detection: Federated and Split Learning Chapter 3 Machine Learning Based Detection in Wireless Sensor Networks Chapter 4 A Secure Approach for Next-Generation IoT Networks: A comparative Analysis Chapter 5 Efficient ECC-Based RFID Authentication for Enhanced IoT Security Chapter 6 An AI-based embedded system for access control and absence management Chapter 7 A new perspective on E-health Perforated Blockchain: An Intelligent Healthcare Revolution using Trigger-Based Supervised Classification Chapter 8 Machine Learning for Security Boosting in Internet of Things Environments Chapter 9 Combined machine learning for anomaly detection in IoT aggregator Rpi Chapter 10 An Efficient Intrusion Detection System for IoT using XGBoost and Feature Selection Chapter 11 A Monitoring System with Deep Learning for IoT Smart Environments Security Chapter 12 An intrusion detection system using Paragraph Vector-Distributed Memory Approach Chapter 13 Advanced security of blockchain authentication system using zero-knowledge protocol Chapter 14 Intelligent Phishing URL Classification using CNN Chapter 15 The Impact of AI and Automation on Digital Forensic Investigations Chapter 16 The Impact of ChatGPT on Cybersecurity: Balancing Benefits Against Risks Chapter 17 Design of an unpredictable Secure PRNG Using Collaborative Linear Feedback Shift Registers Chapter 18 Building Trust with Blockchain: Exploring Its Diverse Applications Chapter 19 ML-Based Detection of GPS Jamming Attacks on Un-manned Aerial Vehicles Chapter 20 A Comparative Analysis of Random Forest and Isolation Forest Intrusion Detection Systems Chapter 21 A Collaborative Anomaly Detection Model using QRNN and Blockchain Chapter 22 Iterated-Greedy with Tabu Search Solving Flow shop Scheduling Problem