Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press, Taylor & Francis Group,
2023
|
Ausgabe: | 1st edition |
Schlagwörter: | |
Links: | https://doi.org/10.1201/9781003199410 https://doi.org/10.1201/9781003199410 |
Abstract: | Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush |
Umfang: | 1 Online-Ressource |
ISBN: | 9781003199410 1003199410 9781003810186 1003810187 9781003810278 1003810276 |
DOI: | 10.1201/9781003199410 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV050270256 | ||
003 | DE-604 | ||
005 | 20250523 | ||
007 | cr|uuu---uuuuu | ||
008 | 250508s2023 xx o|||| 00||| eng d | ||
020 | |a 9781003199410 |c electronic bk. |9 978-1-003-19941-0 | ||
020 | |a 1003199410 |c electronic bk. |9 1-003-19941-0 | ||
020 | |a 9781003810186 |c electronic bk. : PDF |9 978-1-003-81018-6 | ||
020 | |a 1003810187 |c electronic bk. : PDF |9 1-003-81018-7 | ||
020 | |a 9781003810278 |c electronic bk. : EPUB |9 978-1-003-81027-8 | ||
020 | |a 1003810276 |c electronic bk. : EPUB |9 1-003-81027-6 | ||
024 | 7 | |a 10.1201/9781003199410 |2 doi | |
035 | |a (ZDB-7-RHO)9781003199410 | ||
035 | |a (DE-599)BVBBV050270256 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004.67/8 |2 23 | |
245 | 1 | 0 | |a Internet of Things security and privacy |b practical and management perspectives |c edited by Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak |
250 | |a 1st edition | ||
264 | 1 | |a Boca Raton |b CRC Press, Taylor & Francis Group, |c 2023 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush | |
653 | 0 | |a Internet of things | |
653 | 0 | |a Computer security | |
653 | 0 | |a TECHNOLOGY / Electricity | |
700 | 1 | |a Awad, Ali Ismail |0 (DE-588)1091567212 |4 edt | |
700 | 1 | |a Aḥmad, ʿĀṭif |0 (DE-588)152947442 |4 edt | |
700 | 1 | |a Choo, Kim-Kwang Raymond |0 (DE-588)137128738 |4 edt | |
700 | 1 | |a Hakak, Saqib |e Sonstige |4 oth | |
776 | 0 | |z 9781032057712 | |
776 | 0 | |z 9781032058306 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032057712 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-003-81027-6 |
856 | 4 | 0 | |u https://doi.org/10.1201/9781003199410 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-7-RHO | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035604326 | |
966 | e | |u https://doi.org/10.1201/9781003199410 |l DE-706 |p ZDB-7-RHO |q UBY_PC_RHO_25 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1832897458659655680 |
---|---|
adam_text | |
any_adam_object | |
author2 | Awad, Ali Ismail Aḥmad, ʿĀṭif Choo, Kim-Kwang Raymond |
author2_role | edt edt edt |
author2_variant | a i a ai aia ʿ a ʿa k k r c kkr kkrc |
author_GND | (DE-588)1091567212 (DE-588)152947442 (DE-588)137128738 |
author_facet | Awad, Ali Ismail Aḥmad, ʿĀṭif Choo, Kim-Kwang Raymond |
building | Verbundindex |
bvnumber | BV050270256 |
collection | ZDB-7-RHO |
ctrlnum | (ZDB-7-RHO)9781003199410 (DE-599)BVBBV050270256 |
dewey-full | 004.67/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/8 |
dewey-search | 004.67/8 |
dewey-sort | 14.67 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1201/9781003199410 |
edition | 1st edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000001c 4500</leader><controlfield tag="001">BV050270256</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250523</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">250508s2023 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003199410</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-003-19941-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003199410</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-003-19941-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003810186</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">978-1-003-81018-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003810187</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">1-003-81018-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003810278</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">978-1-003-81027-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003810276</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">1-003-81027-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003199410</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-7-RHO)9781003199410</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050270256</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet of Things security and privacy</subfield><subfield code="b">practical and management perspectives</subfield><subfield code="c">edited by Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press, Taylor & Francis Group,</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">TECHNOLOGY / Electricity</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Awad, Ali Ismail</subfield><subfield code="0">(DE-588)1091567212</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aḥmad, ʿĀṭif</subfield><subfield code="0">(DE-588)152947442</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Choo, Kim-Kwang Raymond</subfield><subfield code="0">(DE-588)137128738</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hakak, Saqib</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">9781032057712</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">9781032058306</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032057712</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-003-81027-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1201/9781003199410</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-RHO</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035604326</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003199410</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-7-RHO</subfield><subfield code="q">UBY_PC_RHO_25</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050270256 |
illustrated | Not Illustrated |
indexdate | 2025-05-23T08:00:30Z |
institution | BVB |
isbn | 9781003199410 1003199410 9781003810186 1003810187 9781003810278 1003810276 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035604326 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-7-RHO ZDB-7-RHO UBY_PC_RHO_25 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | CRC Press, Taylor & Francis Group, |
record_format | marc |
spelling | Internet of Things security and privacy practical and management perspectives edited by Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak 1st edition Boca Raton CRC Press, Taylor & Francis Group, 2023 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Cybersecurity Risk Assessment in Advanced Metering InfrastructureMostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. KhalafA Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile DevicesLeigh Turnbull, Zhiyuan Tan and Kehinde O. BabaagbaA Physical-Layer Approach for IoT Information Security During Interference AttacksAbdallah Farraj and Eman HammadPolicy-Driven Security Architecture for Internet of Things (IoT) InfrastructureKallol K Karmakar, Vijay Varadharajan and Uday TupakulaA Privacy-Sensitive, Situation-Aware Description Model for IoTZakaria Maamar, Amel Benna, Noura Faci, Fadwa Yayha, Nacereddine Sitouah, and Wassim Benadje Maamar et al.Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart LocksHussein Hazazi and Mohamed ShehabA Game-Theoretic Approach to Information Availability in IoT NetworksAbdallah Farraj and Eman HammadReview on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical SystemsMuhammad Imran, Kashif Saleem, Qazi Emad Ul Haq, Tanveer Zia and Jalal Al MuhtadiPrivacy-Preserving Analytics of IoT Data Using Generative ModelsMagd Shareah, Rami Malkawi, Ahmed Aleroud, ZainHalloush Internet of things Computer security TECHNOLOGY / Electricity Awad, Ali Ismail (DE-588)1091567212 edt Aḥmad, ʿĀṭif (DE-588)152947442 edt Choo, Kim-Kwang Raymond (DE-588)137128738 edt Hakak, Saqib Sonstige oth 9781032057712 9781032058306 Erscheint auch als Druck-Ausgabe 9781032057712 Erscheint auch als Druck-Ausgabe 1-003-81027-6 https://doi.org/10.1201/9781003199410 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Internet of Things security and privacy practical and management perspectives |
title | Internet of Things security and privacy practical and management perspectives |
title_auth | Internet of Things security and privacy practical and management perspectives |
title_exact_search | Internet of Things security and privacy practical and management perspectives |
title_full | Internet of Things security and privacy practical and management perspectives edited by Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak |
title_fullStr | Internet of Things security and privacy practical and management perspectives edited by Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak |
title_full_unstemmed | Internet of Things security and privacy practical and management perspectives edited by Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak |
title_short | Internet of Things security and privacy |
title_sort | internet of things security and privacy practical and management perspectives |
title_sub | practical and management perspectives |
url | https://doi.org/10.1201/9781003199410 |
work_keys_str_mv | AT awadaliismail internetofthingssecurityandprivacypracticalandmanagementperspectives AT ahmadʿatif internetofthingssecurityandprivacypracticalandmanagementperspectives AT chookimkwangraymond internetofthingssecurityandprivacypracticalandmanagementperspectives AT hakaksaqib internetofthingssecurityandprivacypracticalandmanagementperspectives |