Modeling and design of secure internet of things (Record no. 69284)

000 -LEADER
fixed length control field 04474cam a2200469Ia 4500
001 - CONTROL NUMBER
control field on1158215579
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203605.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200613s2020 xx o 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119593386
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119593387
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119593379
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119593379
082 04 - CLASSIFICATION NUMBER
Call Number 004.67/8
245 00 - TITLE STATEMENT
Title Modeling and design of secure internet of things
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Newark :
Publisher John Wiley & Sons, Incorporated,
Year of publication 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (697 p.)
500 ## - GENERAL NOTE
Remark 1 Description based upon print version of record.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Cover -- Title Page -- Copyright Page -- Contents -- About the Editors -- Foreword -- List of Contributors -- Preface -- Chapter 1 Introduction -- 1.1 Introduction -- 1.2 Overview -- 1.3 Roadmap -- 1.4 Summary and Future Work -- References -- Part I Game Theory for Cyber Deception -- Chapter 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation -- 2.1 Introduction -- 2.2 Game Theory in Security -- 2.3 Binary State Space: Leaky Deception Using Signaling Game with Evidence
505 8# - FORMATTED CONTENTS NOTE
Remark 2 2.4 Continuous State Space: Knowledge Acquisition and Fundamental Limits of Deception -- 2.5 Adaptive Strategic Cyber Defense for APT in Critical Infrastructure Network -- 2.6 Conclusion -- References -- Chapter 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) -- 3.1 Introduction -- 3.2 Modeling the Spread of an Attack -- 3.3 Experiments -- 3.4 Conclusion -- References -- Chapter 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks -- 4.1 Introduction -- 4.2 Problem Statement -- 4.3 Overview to Physical Layer Secrecy
505 8# - FORMATTED CONTENTS NOTE
Remark 2 4.4 Introduction to Stackelberg Games -- 4.5 Proposed Game-Theoretic Spectrum Leasing Model to Enhance Secrecy Rate -- 4.6 Conclusion -- References -- Chapter 5 Adaptation and Deception in Adversarial Cyber Operations -- 5.1 Introduction -- 5.2 Key Aspects of Recent Game Theory Successes -- 5.3 Real-World Adversarial Situations -- 5.4 Paradoxes and Paradoxes Resolved -- 5.5 Summary -- Acknowledgments -- References -- Chapter 6 On Development of a Game-Theoretic Model for Deception-Based Security -- 6.1 Introduction -- 6.2 Related Research -- 6.3 Game-Theoretic Deception Model
505 8# - FORMATTED CONTENTS NOTE
Remark 2 6.4 Deception Using N Computing Devices -- 6.5 Deception in a Tree-Based Network Structure -- 6.6 Simulation Results -- 6.7 Conclusion -- References -- Chapter 7 Deception for Cyber Adversaries: Deception for Cyber Adversaries: Status, Challenges, and Perspectives -- 7.1 Introduction -- 7.2 Background -- 7.3 The Taxonomy for Cyber Deception -- 7.4 Game-Theoretic Model for Cyber Deception -- 7.5 Open Challenges and Opportunities -- 7.6 Summary -- References -- Part II IoT Security Modeling and Analysis -- Chapter 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling
505 8# - FORMATTED CONTENTS NOTE
Remark 2 8.1 Introduction -- 8.2 Vulnerabilities in IoT -- 8.3 Multi-modeling Approach for CPS Vulnerability Analysis -- 8.4 Open Questions and Future Research Directions -- References -- Chapter 9 Securing Smart Cities: Implications and Challenges -- 9.1 Foreword -- 9.2 Detection, Identification, Fingerprinting, and Behavioral Monitoring in Smart Cities -- 9.3 Modeling Smart Cities -- 9.4 The Future: Connecting and Federating IoT Technologies in Smart Cities -- 9.5 Epilogue -- Acknowledgment -- References
500 ## - GENERAL NOTE
Remark 1 Chapter 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Kamhoua, Charles A.
700 1# - AUTHOR 2
Author 2 Njilla, Laurent L.
700 1# - AUTHOR 2
Author 2 Kott, Alexander.
700 1# - AUTHOR 2
Author 2 Shetty, Sachin.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119593386
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Internet of things
994 ## -
-- 92
-- DG1

No items available.