000 04474cam a2200469Ia 4500
001 on1158215579
003 OCoLC
005 20220711203605.0
006 m d
007 cr un|---aucuu
008 200613s2020 xx o 000 0 eng d
040 _aEBLCP
_beng
_cEBLCP
_dDG1
020 _a9781119593386
_q(electronic bk. : oBook)
020 _a1119593387
_q(electronic bk. : oBook)
020 _a9781119593379
020 _a1119593379
035 _a(OCoLC)1158215579
050 4 _aTK5105.8857
082 0 4 _a004.67/8
_223
049 _aMAIN
245 0 0 _aModeling and design of secure internet of things
_h[electronic resource] /
_cedited by Charles A. Kamhoua [and more].
260 _aNewark :
_bJohn Wiley & Sons, Incorporated,
_c2020.
300 _a1 online resource (697 p.)
500 _aDescription based upon print version of record.
505 0 _aCover -- Title Page -- Copyright Page -- Contents -- About the Editors -- Foreword -- List of Contributors -- Preface -- Chapter 1 Introduction -- 1.1 Introduction -- 1.2 Overview -- 1.3 Roadmap -- 1.4 Summary and Future Work -- References -- Part I Game Theory for Cyber Deception -- Chapter 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation -- 2.1 Introduction -- 2.2 Game Theory in Security -- 2.3 Binary State Space: Leaky Deception Using Signaling Game with Evidence
505 8 _a2.4 Continuous State Space: Knowledge Acquisition and Fundamental Limits of Deception -- 2.5 Adaptive Strategic Cyber Defense for APT in Critical Infrastructure Network -- 2.6 Conclusion -- References -- Chapter 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) -- 3.1 Introduction -- 3.2 Modeling the Spread of an Attack -- 3.3 Experiments -- 3.4 Conclusion -- References -- Chapter 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks -- 4.1 Introduction -- 4.2 Problem Statement -- 4.3 Overview to Physical Layer Secrecy
505 8 _a4.4 Introduction to Stackelberg Games -- 4.5 Proposed Game-Theoretic Spectrum Leasing Model to Enhance Secrecy Rate -- 4.6 Conclusion -- References -- Chapter 5 Adaptation and Deception in Adversarial Cyber Operations -- 5.1 Introduction -- 5.2 Key Aspects of Recent Game Theory Successes -- 5.3 Real-World Adversarial Situations -- 5.4 Paradoxes and Paradoxes Resolved -- 5.5 Summary -- Acknowledgments -- References -- Chapter 6 On Development of a Game-Theoretic Model for Deception-Based Security -- 6.1 Introduction -- 6.2 Related Research -- 6.3 Game-Theoretic Deception Model
505 8 _a6.4 Deception Using N Computing Devices -- 6.5 Deception in a Tree-Based Network Structure -- 6.6 Simulation Results -- 6.7 Conclusion -- References -- Chapter 7 Deception for Cyber Adversaries: Deception for Cyber Adversaries: Status, Challenges, and Perspectives -- 7.1 Introduction -- 7.2 Background -- 7.3 The Taxonomy for Cyber Deception -- 7.4 Game-Theoretic Model for Cyber Deception -- 7.5 Open Challenges and Opportunities -- 7.6 Summary -- References -- Part II IoT Security Modeling and Analysis -- Chapter 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling
505 8 _a8.1 Introduction -- 8.2 Vulnerabilities in IoT -- 8.3 Multi-modeling Approach for CPS Vulnerability Analysis -- 8.4 Open Questions and Future Research Directions -- References -- Chapter 9 Securing Smart Cities: Implications and Challenges -- 9.1 Foreword -- 9.2 Detection, Identification, Fingerprinting, and Behavioral Monitoring in Smart Cities -- 9.3 Modeling Smart Cities -- 9.4 The Future: Connecting and Federating IoT Technologies in Smart Cities -- 9.5 Epilogue -- Acknowledgment -- References
500 _aChapter 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things
590 _aJohn Wiley and Sons
_bWiley Frontlist Obook All English 2020
650 0 _aInternet of things
_xSecurity measures.
_96353
655 4 _aElectronic books.
_93294
700 1 _aKamhoua, Charles A.
_99097
700 1 _aNjilla, Laurent L.
_99098
700 1 _aKott, Alexander.
_99099
700 1 _aShetty, Sachin.
_99100
776 0 8 _iPrint version:
_aKamhoua, Charles A.
_tModeling and Design of Secure Internet of Things
_dNewark : John Wiley & Sons, Incorporated,c2020
_z9781119593362
856 4 0 _uhttps://doi.org/10.1002/9781119593386
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c69284
_d69284