Modeling and design of secure Internet of things / (Record no. 40911)

MARC details
000 -LEADER
fixed length control field 07008nam a2200601 i 4500
001 - CONTROL NUMBER
control field 9123990
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230927112402.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 201203s2020 nju ob 001 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
Canceled/invalid LC control number 2020028698 (print)
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
Canceled/invalid national bibliography number GBC0E8010 (print)
016 ## - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Canceled/invalid control number 019959422 (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119593379
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119593360
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119593362
Qualifying information hardback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119593379
Qualifying information adobe pdf
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119593393
Qualifying information ePub
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119593386
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)mat09123990
035 ## - SYSTEM CONTROL NUMBER
System control number (IDAMS)0b0000648cc7f1e5
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
245 00 - TITLE STATEMENT
Title Modeling and design of secure Internet of things /
Statement of responsibility, etc. edited by Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, Sachin Shetty.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer Wiley-IEEE Press,
Date of production, publication, distribution, manufacture, or copyright notice [2020]
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Piscataqay, New Jersey] :
Name of producer, publisher, distributor, manufacturer IEEE Xplore,
Date of production, publication, distribution, manufacture, or copyright notice [2020]
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (1 volume).
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement IEEE press
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note About the Editors ix -- List of Contributors xiii -- Foreword xix -- Preface xxiii -- 1 Introduction 1 /Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty -- Part I Game Theory for Cyber Deception 27 -- 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation 29 /Tao Zhang, Linan Huang, Jeffrey Pawlick, and Quanyan Zhu -- 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) 59 /Bowei Xi and Charles A. Kamhoua -- 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks 79 /Fatemeh Afghah, Alireza Shamsoshoara, Laurent L. Njilla, and Charles A. Kamhoua -- 5 Adaptation and Deception in Adversarial Cyber Operations 111 /George Cybenko -- 6 On Development of a Game-Theoretic Model for Deception-Based Security 123 /Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, and Laurent L. Njilla -- 7 Deception for Cyber Adversaries: Status, Challenges, and Perspectives 141 /Abdullah Alshammari, Danda B. Rawat, Moses Garuba, Charles A. Kamhoua, and Laurent L. Njilla -- Part II IoT Security Modeling and Analysis 161 -- 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling 163 /Ted Bapty, Abhishek Dubey, and Janos Sztipanovits -- 9 Securing Smart Cities: Implications and Challenges 185 /Ioannis Agadakos, Prashant Anantharaman, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Tancr�de Lepoint, Ulf Lindqvist, Michael Locasto, and Liwei Song -- 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things 217 /Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, and Dong Seong Kim -- 11 Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling 249 /Hisham Alasmary, Afsah Anwar, Laurent L. Njilla, Charles A. Kamhoua, and Aziz Mohaisen -- 12 Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs 273 /Marco Gamarra, Sachin Shetty, Oscar Gonzalez, David M. Nicol, Charles A. Kamhoua, and Laurent L. Njilla.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 13 Anomaly Behavior Analysis of IoT Protocols 295 /Pratik Satam, Shalaka Satam, Salim Hariri, and Amany Alshawi -- 14 Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework 331 /Md Ali Reza Al Amin, Sachin Shetty, Laurent L. Njilla, Deepak K. Tosh, and Charles A. Kamhoua -- 15 A Coding Theoretic View of Secure State Reconstruction 357 /Suhas Diggavi and Paulo Tabuada -- 16 Governance for the Internet of Things: Striving Toward Resilience 371 /S. E. Galaitsi, Benjamin D. Trump, and Igor Linkov -- Part III IoT Security Design 383 -- 17 Secure and Resilient Control of IoT-Based 3D Printers 385 /Zhiheng Xu and Quanyan Zhu -- 18 Proactive Defense Against Security Threats on IoT Hardware 407 /Qiaoyan Yu, Zhiming Zhang, and Jaya Dofe -- 19 IoT Device Attestation: From a Cross-Layer Perspective 435 /Orlando Arias, Fahim Rahman, Mark Tehranipoor, and Yier Jin -- 20 Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT) 453 /Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, and Jay Chen -- 21 Leverage SDN for Cyber-Security Deception in Internet of Things 479 /Yaoqing Liu, Garegin Grigoryan, Charles A. Kamhoua, and Laurent L. Njilla -- 22 Decentralized Access Control for IoT Based on Blockchain and Smart Contract 505 /Ronghua Xu, Yu Chen, and Erik Blasch -- 23 Intent as a Secure Design Primitive 529 /Prashant Anantharaman, J. Peter Brady, Ira Ray Jenkins, Vijay H. Kothari, Michael C. Millian, Kartik Palani, Kirti V. Rathore, Jason Reeves, Rebecca Shapiro, Syed H. Tanveer, Sergey Bratus, and Sean W. Smith -- 24 A Review of Moving Target Defense Mechanisms for Internet of Things Applications 563 /Nico Saputro, Samet Tonyali, Abdullah Aydeger, Kemal Akkaya, Mohammad A. Rahman, and Selcuk Uluagac -- 25 Toward Robust Outlier Detector for Internet of Things Applications 615 /Raj Mani Shukla and Shamik Sengupta -- 26 Summary and Future Work 635 /Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Index 647.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Restricted to subscribers or individual electronic text purchasers.
520 ## - SUMMARY, ETC.
Summary, etc. "Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."--
Assigning source Provided by publisher.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 12/03/2020.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things
General subdivision Security measures.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kamhoua, Charles A.,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Njilla, Laurent L.,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kott, Alexander,
Dates associated with a name 1971-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Shetty, Sachin,
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IEEE Xplore (Online Service),
Relator term distributor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Wiley,
Relator term publisher.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IEEE press
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier <a href="https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9123990">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9123990</a>

No items available.

© 2023 IMPA Library | Customized & Maintained by Sérgio Pilotto


Powered by Koha