000 05599nam a2200697 i 4500
001 7753052
003 IEEE
005 20230927112359.0
006 m o d
007 cr |n|||||||||
008 170210s2016 nju ob 001 eng d
020 _a9781119193784
_qelectronic bk.
020 _z9781119193869
_qprint
020 _z1119193788
_qelectronic bk.
020 _z9781119193883
_qelectronic bk.
020 _z1119193885
_qelectronic bk.
020 _z9781119193876
_qelectronic bk.
020 _z1119193877
_qelectronic bk.
024 7 _a10.1002/9781119193784
_2doi
035 _a(CaBNVSL)mat07753052
035 _a(IDAMS)0b0000648585c68f
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
082 0 4 _a004.67/8
245 0 0 _aCyber-assurance for the internet of things /
_cedited by Tyson T. Brooks.
264 1 _aHoboken, New Jersey :
_bWiley :
_bIEEE Press,
_c[2017]
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2016]
300 _a1 PDF (520 pages).
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aEmbedded Design Security. Certified Security by Design for the Internet of Things / Shiu-Kai Chin -- Cyber-Assurance Through Embedded Security for the Internet of Things / Tyson T Brooks, Joon Park -- A Secure Update Mechanism for Internet of Things Devices / Martin Goldberg -- Trust Impact. Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective / M Bala Krishna -- The Impact of IoT Devices on Network Trust Boundaries / Nicole Newmeyer -- Wearable Automation Provenance. Wearable IoT Computing: Interface, Emotions, Wearer'S Culture, and Security/Privacy Concerns / Robert Mccloud, Martha Lerski, Joon Park, Tyson T Brooks -- On Vulnerabilities of IoT-Based Consumer-Oriented Closed-Loop Control Automation Systems / Martin Murillo -- Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety / Mark Underwood -- Cloud Artificial Intelligence Cyber-Physical Systems. A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture / Tyson T Brooks, Lee McKnight -- An Artificial Intelligence Perspective on Ensuring Cyber-Assurance for the Internet of Things / Utku Kose -- Perceived Threat Modeling for Cyber-Physical Systems / Christopher Leberknight.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _aPresents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. . Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications. Aids readers in understanding how to design and build cyber-assurance into the IoT. Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance. Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aOnline resource; title from PDF title page (John Wiley, viewed December 29, 2016).
650 0 _aInternet of things
_xSecurity measures.
655 4 _aElectronic books.
695 _aActuators
695 _aAutomation
695 _aComputer architecture
695 _aCyber-physical systems
695 _aFloods
695 _aHydroelectric power generation
695 _aInformation technology
695 _aInternet
695 _aIntrusion detection
695 _aMarine animals
695 _aProcess control
695 _aProtocols
695 _aReservoirs
695 _aRivers
695 _aSoftware systems
700 1 _aBrooks, Tyson T.
_eeditor.
710 2 _aIEEE Xplore (Online Service),
_edistributor.
710 2 _aWiley,
_epublisher.
776 0 8 _iPrint version:
_z9781119193869
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7753052
999 _c40741
_d40741