000 | 04474cam a2200469Ia 4500 | ||
---|---|---|---|
001 | on1158215579 | ||
003 | OCoLC | ||
005 | 20220711203605.0 | ||
006 | m d | ||
007 | cr un|---aucuu | ||
008 | 200613s2020 xx o 000 0 eng d | ||
040 |
_aEBLCP _beng _cEBLCP _dDG1 |
||
020 |
_a9781119593386 _q(electronic bk. : oBook) |
||
020 |
_a1119593387 _q(electronic bk. : oBook) |
||
020 | _a9781119593379 | ||
020 | _a1119593379 | ||
035 | _a(OCoLC)1158215579 | ||
050 | 4 | _aTK5105.8857 | |
082 | 0 | 4 |
_a004.67/8 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aModeling and design of secure internet of things _h[electronic resource] / _cedited by Charles A. Kamhoua [and more]. |
260 |
_aNewark : _bJohn Wiley & Sons, Incorporated, _c2020. |
||
300 | _a1 online resource (697 p.) | ||
500 | _aDescription based upon print version of record. | ||
505 | 0 | _aCover -- Title Page -- Copyright Page -- Contents -- About the Editors -- Foreword -- List of Contributors -- Preface -- Chapter 1 Introduction -- 1.1 Introduction -- 1.2 Overview -- 1.3 Roadmap -- 1.4 Summary and Future Work -- References -- Part I Game Theory for Cyber Deception -- Chapter 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation -- 2.1 Introduction -- 2.2 Game Theory in Security -- 2.3 Binary State Space: Leaky Deception Using Signaling Game with Evidence | |
505 | 8 | _a2.4 Continuous State Space: Knowledge Acquisition and Fundamental Limits of Deception -- 2.5 Adaptive Strategic Cyber Defense for APT in Critical Infrastructure Network -- 2.6 Conclusion -- References -- Chapter 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) -- 3.1 Introduction -- 3.2 Modeling the Spread of an Attack -- 3.3 Experiments -- 3.4 Conclusion -- References -- Chapter 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks -- 4.1 Introduction -- 4.2 Problem Statement -- 4.3 Overview to Physical Layer Secrecy | |
505 | 8 | _a4.4 Introduction to Stackelberg Games -- 4.5 Proposed Game-Theoretic Spectrum Leasing Model to Enhance Secrecy Rate -- 4.6 Conclusion -- References -- Chapter 5 Adaptation and Deception in Adversarial Cyber Operations -- 5.1 Introduction -- 5.2 Key Aspects of Recent Game Theory Successes -- 5.3 Real-World Adversarial Situations -- 5.4 Paradoxes and Paradoxes Resolved -- 5.5 Summary -- Acknowledgments -- References -- Chapter 6 On Development of a Game-Theoretic Model for Deception-Based Security -- 6.1 Introduction -- 6.2 Related Research -- 6.3 Game-Theoretic Deception Model | |
505 | 8 | _a6.4 Deception Using N Computing Devices -- 6.5 Deception in a Tree-Based Network Structure -- 6.6 Simulation Results -- 6.7 Conclusion -- References -- Chapter 7 Deception for Cyber Adversaries: Deception for Cyber Adversaries: Status, Challenges, and Perspectives -- 7.1 Introduction -- 7.2 Background -- 7.3 The Taxonomy for Cyber Deception -- 7.4 Game-Theoretic Model for Cyber Deception -- 7.5 Open Challenges and Opportunities -- 7.6 Summary -- References -- Part II IoT Security Modeling and Analysis -- Chapter 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling | |
505 | 8 | _a8.1 Introduction -- 8.2 Vulnerabilities in IoT -- 8.3 Multi-modeling Approach for CPS Vulnerability Analysis -- 8.4 Open Questions and Future Research Directions -- References -- Chapter 9 Securing Smart Cities: Implications and Challenges -- 9.1 Foreword -- 9.2 Detection, Identification, Fingerprinting, and Behavioral Monitoring in Smart Cities -- 9.3 Modeling Smart Cities -- 9.4 The Future: Connecting and Federating IoT Technologies in Smart Cities -- 9.5 Epilogue -- Acknowledgment -- References | |
500 | _aChapter 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things | ||
590 |
_aJohn Wiley and Sons _bWiley Frontlist Obook All English 2020 |
||
650 | 0 |
_aInternet of things _xSecurity measures. _96353 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aKamhoua, Charles A. _99097 |
|
700 | 1 |
_aNjilla, Laurent L. _99098 |
|
700 | 1 |
_aKott, Alexander. _99099 |
|
700 | 1 |
_aShetty, Sachin. _99100 |
|
776 | 0 | 8 |
_iPrint version: _aKamhoua, Charles A. _tModeling and Design of Secure Internet of Things _dNewark : John Wiley & Sons, Incorporated,c2020 _z9781119593362 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119593386 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c69284 _d69284 |