Decision Making and Security Risk Management for IoT Environments (Record no. 87509)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05169nam a22006135i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-47590-0 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730171321.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240221s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031475900 |
-- | 978-3-031-47590-0 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 323.448 |
245 10 - TITLE STATEMENT | |
Title | Decision Making and Security Risk Management for IoT Environments |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | VIII, 229 p. 115 illus., 85 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Advances in Information Security, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Internet of Things Overview: Architecture, Technologies, Application, and Challenges -- IoMT Applications Perspectives: from Opportunities and Security Challenges to Cyber-Risk Management -- Cybersecurity Challenges and Implications for the Adoption of Cloud Computing and IoT: DDoS Attacks as an Example -- Implementation of the C4.5 Algorithm in the Internet of Things Applications -- Intrusion Detection Systems using Machine Learning -- Multivariate Procedure for Modeling and Prediction of Temperature in Punjab, Pakistan -- New Proposed Model for the Influence of Climate Change on the Tension Anticipation in Hospital Emergencies -- Statistical Downscaling Modeling for Temperature Prediction -- UAV-based IoT applications for action recognition -- Federated Learning for Market Surveillance -- Fake News in Social Media: Fake News Themes and Intentional Deception in the News and on Social Media. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The authors provide a variety of subjects related to the following Keywords: IoT, security, AI, deep learning, federated learning, intrusion detection systems, and distributed computing paradigms. This book also offers a collection of the most up-to-date research, providing a complete overview of security and privacy-preserving in IoT environments. It introduces new approaches based on machine learning that tackles security challenges and provides the field with new research material that's not covered in the primary literature. The Internet of Things (IoT) refers to a network of tiny devices linked to the Internet or other communication networks. IoT is gaining popularity, because it opens up new possibilities for developing many modern applications. This would include smart cities, smart agriculture, innovativehealthcare services and more. The worldwide IoT market surpassed $100 billion in sales for the first time in 2017, and forecasts show that this number might reach $1.6 trillion by 2025. However, as IoT devices grow more widespread, threats, privacy and security concerns are growing. The massive volume of data exchanged highlights significant challenges to preserving individual privacy and securing shared data. Therefore, securing the IoT environment becomes difficult for research and industry stakeholders. Researchers, graduate students and educators in the fields of computer science, cybersecurity, distributed systems and artificial intelligence will want to purchase this book. It will also be a valuable companion for users and developers interested in decision-making and security risk management in IoT environments. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Law and legislation. |
700 1# - AUTHOR 2 | |
Author 2 | Boulila, Wadii. |
700 1# - AUTHOR 2 | |
Author 2 | Ahmad, Jawad. |
700 1# - AUTHOR 2 | |
Author 2 | Koubaa, Anis. |
700 1# - AUTHOR 2 | |
Author 2 | Driss, Maha. |
700 1# - AUTHOR 2 | |
Author 2 | Farah, Imed Riadh. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-47590-0 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Machine learning. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cooperating objects (Computer systems). |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Privacy. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Machine Learning. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cyber-Physical Systems. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2512-2193 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.