Securing cyber-physical systems / (Record no. 69921)

000 -LEADER
fixed length control field 03123cam a2200337Ii 4500
001 - CONTROL NUMBER
control field 9780429091049
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180331t20162016fluad ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780429091049
-- (e-book : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- (hardback)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
-- S446
245 00 - TITLE STATEMENT
Title Securing cyber-physical systems /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
505 0# - FORMATTED CONTENTS NOTE
Remark 2 1. Securing power systems / Martin Saint, Juan Hoyos, and Timothy X. Brown -- 2. ICT modeling for cosimulation of integrated cyberpower systems / Alexandru Stefanov, Chen-Ching Liu, and Kithsiri Liyanage -- 3. Moving target defense mechanisms in cyber-physical systems / Shih-Wei Fang, Anthony Portante, and Mohammad Iftekhar Husain -- 4. Ontological framework-assisted embedded system design with security consideration in a cyber-physical power system environment / Bo Xing -- 5. WSNProtectLayer : security middleware for wireless sensor networks / Vashek Matyas, Petr Svenda, Andriy Stetsko, Dusan Klinec, Filip Jurnecka, and Martin Stehlik -- 6. Securing transportation cyber-physical systems / Nnanna Ekedebe, Houbing Song, Wei Yu, Chao Lu, and Yan Wan -- 7. Securing the future autonomous vehicle : a cyber-physical systems approach / Mario Gerla and Peter Reiher -- 8. A study of security issues, vulnerabilities, and challenges in the internet of things / Kashif Laeeq and Jawwad A. Shamsi -- 9. Security and privacy in the IPv6-connected internet of things / Shahid Raza, Chamath Keppitiyagama, and Thiemo Voigt -- 10. Security issues and approaches in M2M communications / Yue Qiu and Maode Ma -- 11. Securing embedded systems : cyberattacks, countermeasures, and challenges / Mohamed Amine Ferrag, Nassira Chekkai, and Mehdi Nafa -- 12. Using software-defined networking to mitigate cyberattacks in industrial control systems / Bela Genge, Hunor Sandor, Piroska Haller, Adela Beres, and Istvan Kiss -- 13. Tackling cross-site scripting (XSS) attacks in cyberspace / Al-Sakib Khan Pathan and Imran Yusof -- 14. Trojan-resilient circuits / Jean-Pierre Seifert and Christoph Bayer -- 15. Intrusion detection, prevention, and response system (IDPRS) for cyber-physical systems (CPSs) / Jianguo Ding -- 16. Security-integrated quality-of-service paradigm for cyber-physical systems / Zubair Md. Fadlullah.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Pathan, Al-Sakib Khan,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781498700993
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Boca Raton :
-- Taylor & Francis,
-- [2016]
264 #4 -
-- ©2016
336 ## -
-- text
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cooperating objects (Computer systems)
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Embedded computer systems
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Infrastructure (Economics)

No items available.