Modeling and design of secure Internet of things / (Record no. 40911)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07008nam a2200601 i 4500 |
001 - CONTROL NUMBER | |
control field | 9123990 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230927112402.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 201203s2020 nju ob 001 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
Canceled/invalid LC control number | 2020028698 (print) |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
Canceled/invalid national bibliography number | GBC0E8010 (print) |
016 ## - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Canceled/invalid control number | 019959422 (print) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119593379 |
Qualifying information | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119593360 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119593362 |
Qualifying information | hardback |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119593379 |
Qualifying information | adobe pdf |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119593393 |
Qualifying information | ePub |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119593386 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaBNVSL)mat09123990 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (IDAMS)0b0000648cc7f1e5 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | CaBNVSL |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | CaBNVSL |
Modifying agency | CaBNVSL |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
245 00 - TITLE STATEMENT | |
Title | Modeling and design of secure Internet of things / |
Statement of responsibility, etc. | edited by Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, Sachin Shetty. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, New Jersey : |
Name of producer, publisher, distributor, manufacturer | Wiley-IEEE Press, |
Date of production, publication, distribution, manufacture, or copyright notice | [2020] |
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | [Piscataqay, New Jersey] : |
Name of producer, publisher, distributor, manufacturer | IEEE Xplore, |
Date of production, publication, distribution, manufacture, or copyright notice | [2020] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 PDF (1 volume). |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | electronic |
Source | isbdmedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | IEEE press |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | About the Editors ix -- List of Contributors xiii -- Foreword xix -- Preface xxiii -- 1 Introduction 1 /Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty -- Part I Game Theory for Cyber Deception 27 -- 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation 29 /Tao Zhang, Linan Huang, Jeffrey Pawlick, and Quanyan Zhu -- 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) 59 /Bowei Xi and Charles A. Kamhoua -- 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks 79 /Fatemeh Afghah, Alireza Shamsoshoara, Laurent L. Njilla, and Charles A. Kamhoua -- 5 Adaptation and Deception in Adversarial Cyber Operations 111 /George Cybenko -- 6 On Development of a Game-Theoretic Model for Deception-Based Security 123 /Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, and Laurent L. Njilla -- 7 Deception for Cyber Adversaries: Status, Challenges, and Perspectives 141 /Abdullah Alshammari, Danda B. Rawat, Moses Garuba, Charles A. Kamhoua, and Laurent L. Njilla -- Part II IoT Security Modeling and Analysis 161 -- 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling 163 /Ted Bapty, Abhishek Dubey, and Janos Sztipanovits -- 9 Securing Smart Cities: Implications and Challenges 185 /Ioannis Agadakos, Prashant Anantharaman, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Tancr�de Lepoint, Ulf Lindqvist, Michael Locasto, and Liwei Song -- 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things 217 /Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, and Dong Seong Kim -- 11 Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling 249 /Hisham Alasmary, Afsah Anwar, Laurent L. Njilla, Charles A. Kamhoua, and Aziz Mohaisen -- 12 Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs 273 /Marco Gamarra, Sachin Shetty, Oscar Gonzalez, David M. Nicol, Charles A. Kamhoua, and Laurent L. Njilla. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 13 Anomaly Behavior Analysis of IoT Protocols 295 /Pratik Satam, Shalaka Satam, Salim Hariri, and Amany Alshawi -- 14 Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework 331 /Md Ali Reza Al Amin, Sachin Shetty, Laurent L. Njilla, Deepak K. Tosh, and Charles A. Kamhoua -- 15 A Coding Theoretic View of Secure State Reconstruction 357 /Suhas Diggavi and Paulo Tabuada -- 16 Governance for the Internet of Things: Striving Toward Resilience 371 /S. E. Galaitsi, Benjamin D. Trump, and Igor Linkov -- Part III IoT Security Design 383 -- 17 Secure and Resilient Control of IoT-Based 3D Printers 385 /Zhiheng Xu and Quanyan Zhu -- 18 Proactive Defense Against Security Threats on IoT Hardware 407 /Qiaoyan Yu, Zhiming Zhang, and Jaya Dofe -- 19 IoT Device Attestation: From a Cross-Layer Perspective 435 /Orlando Arias, Fahim Rahman, Mark Tehranipoor, and Yier Jin -- 20 Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT) 453 /Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, and Jay Chen -- 21 Leverage SDN for Cyber-Security Deception in Internet of Things 479 /Yaoqing Liu, Garegin Grigoryan, Charles A. Kamhoua, and Laurent L. Njilla -- 22 Decentralized Access Control for IoT Based on Blockchain and Smart Contract 505 /Ronghua Xu, Yu Chen, and Erik Blasch -- 23 Intent as a Secure Design Primitive 529 /Prashant Anantharaman, J. Peter Brady, Ira Ray Jenkins, Vijay H. Kothari, Michael C. Millian, Kartik Palani, Kirti V. Rathore, Jason Reeves, Rebecca Shapiro, Syed H. Tanveer, Sergey Bratus, and Sean W. Smith -- 24 A Review of Moving Target Defense Mechanisms for Internet of Things Applications 563 /Nico Saputro, Samet Tonyali, Abdullah Aydeger, Kemal Akkaya, Mohammad A. Rahman, and Selcuk Uluagac -- 25 Toward Robust Outlier Detector for Internet of Things Applications 615 /Raj Mani Shukla and Shamik Sengupta -- 26 Summary and Future Work 635 /Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Index 647. |
506 ## - RESTRICTIONS ON ACCESS NOTE | |
Terms governing access | Restricted to subscribers or individual electronic text purchasers. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."-- |
Assigning source | Provided by publisher. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE | |
Additional physical form available note | Also available in print. |
538 ## - SYSTEM DETAILS NOTE | |
System details note | Mode of access: World Wide Web |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on PDF viewed 12/03/2020. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Internet of things |
General subdivision | Security measures. |
655 #0 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kamhoua, Charles A., |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Njilla, Laurent L., |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kott, Alexander, |
Dates associated with a name | 1971- |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Shetty, Sachin, |
Relator term | editor. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | IEEE Xplore (Online Service), |
Relator term | distributor. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | Wiley, |
Relator term | publisher. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | IEEE press |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Abstract with links to resource |
Uniform Resource Identifier | <a href="https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9123990">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9123990</a> |
No items available.