Modeling and design of secure internet of things (Record no. 69284)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04474cam a2200469Ia 4500 |
001 - CONTROL NUMBER | |
control field | on1158215579 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711203605.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200613s2020 xx o 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119593386 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119593387 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119593379 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119593379 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 004.67/8 |
245 00 - TITLE STATEMENT | |
Title | Modeling and design of secure internet of things |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Newark : |
Publisher | John Wiley & Sons, Incorporated, |
Year of publication | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource (697 p.) |
500 ## - GENERAL NOTE | |
Remark 1 | Description based upon print version of record. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Cover -- Title Page -- Copyright Page -- Contents -- About the Editors -- Foreword -- List of Contributors -- Preface -- Chapter 1 Introduction -- 1.1 Introduction -- 1.2 Overview -- 1.3 Roadmap -- 1.4 Summary and Future Work -- References -- Part I Game Theory for Cyber Deception -- Chapter 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation -- 2.1 Introduction -- 2.2 Game Theory in Security -- 2.3 Binary State Space: Leaky Deception Using Signaling Game with Evidence |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 2.4 Continuous State Space: Knowledge Acquisition and Fundamental Limits of Deception -- 2.5 Adaptive Strategic Cyber Defense for APT in Critical Infrastructure Network -- 2.6 Conclusion -- References -- Chapter 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) -- 3.1 Introduction -- 3.2 Modeling the Spread of an Attack -- 3.3 Experiments -- 3.4 Conclusion -- References -- Chapter 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks -- 4.1 Introduction -- 4.2 Problem Statement -- 4.3 Overview to Physical Layer Secrecy |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 4.4 Introduction to Stackelberg Games -- 4.5 Proposed Game-Theoretic Spectrum Leasing Model to Enhance Secrecy Rate -- 4.6 Conclusion -- References -- Chapter 5 Adaptation and Deception in Adversarial Cyber Operations -- 5.1 Introduction -- 5.2 Key Aspects of Recent Game Theory Successes -- 5.3 Real-World Adversarial Situations -- 5.4 Paradoxes and Paradoxes Resolved -- 5.5 Summary -- Acknowledgments -- References -- Chapter 6 On Development of a Game-Theoretic Model for Deception-Based Security -- 6.1 Introduction -- 6.2 Related Research -- 6.3 Game-Theoretic Deception Model |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 6.4 Deception Using N Computing Devices -- 6.5 Deception in a Tree-Based Network Structure -- 6.6 Simulation Results -- 6.7 Conclusion -- References -- Chapter 7 Deception for Cyber Adversaries: Deception for Cyber Adversaries: Status, Challenges, and Perspectives -- 7.1 Introduction -- 7.2 Background -- 7.3 The Taxonomy for Cyber Deception -- 7.4 Game-Theoretic Model for Cyber Deception -- 7.5 Open Challenges and Opportunities -- 7.6 Summary -- References -- Part II IoT Security Modeling and Analysis -- Chapter 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 8.1 Introduction -- 8.2 Vulnerabilities in IoT -- 8.3 Multi-modeling Approach for CPS Vulnerability Analysis -- 8.4 Open Questions and Future Research Directions -- References -- Chapter 9 Securing Smart Cities: Implications and Challenges -- 9.1 Foreword -- 9.2 Detection, Identification, Fingerprinting, and Behavioral Monitoring in Smart Cities -- 9.3 Modeling Smart Cities -- 9.4 The Future: Connecting and Federating IoT Technologies in Smart Cities -- 9.5 Epilogue -- Acknowledgment -- References |
500 ## - GENERAL NOTE | |
Remark 1 | Chapter 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Kamhoua, Charles A. |
700 1# - AUTHOR 2 | |
Author 2 | Njilla, Laurent L. |
700 1# - AUTHOR 2 | |
Author 2 | Kott, Alexander. |
700 1# - AUTHOR 2 | |
Author 2 | Shetty, Sachin. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1002/9781119593386 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Internet of things |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.