Fr. 85.00

Internet of Things Security and Privacy - Practical and Management Perspectives

Inglese · Tascabile

Pubblicazione il 27.06.2025

Descrizione

Ulteriori informazioni










The Internet of Things (IoT) has emerged due to information and communication technology developments, expanding the ability to connect numerous objects.


Sommario










1. Cybersecurity Risk Assessment in Advanced Metering Infrastructure. 2. A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices. 3. A Physical-Layer Approach for IoT Information Security During Interference Attacks. 4. Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure. 5. A Privacy-Sensitive, Situation-Aware Description Model for IoT. 6. Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart Locks. 7. A Game-Theoretic Approach to Information Availability in IoT Networks. 8. Review on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical Systems. 9.Privacy-Preserving Analytics of IoT Data Using Generative Models


Info autore










Ali Ismail Awad (Ph.D., SMIEEE, MACM) is currently an associate professor with the College of Information Technology (CIT), United Arab Emirates University (UAEU), Al Ain, United Arab Emirates. He has been coordinating the Master's Program in Information Security at the same institution since 2022. Dr. Awad is an associate professor with the Electrical Engineering Department, Faculty of Engineering, Al-Azhar University at Qena, Egypt. He is also a visiting researcher at the University of Plymouth, United Kingdom. Dr. Awad was an associate professor (Docent) with the Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå , Sweden, where he coordinated the Master's Program in Information Security from 2017 to 2020. His research interests include cybersecurity, network security, IoT security, and image analysis with biometrics and medical imaging applications. Dr. Awad has edited or co-edited several books and authored or co-authored several journal articles and conference papers in these areas. He is an editorial board member of the Future Generation Computer Systems Journal, Computers & Security Journal, The Internet of Things, Engineering Cyber-Physical Human Systems Journal, The Health Information Science and Systems Journal, and The Security, Privacy and Authentication section of Frontiers. Dr. Awad is currently an IEEE senior member and an ACM Professional Member.
Atif Ahmad (Ph.D., CPP) is an associate professor at the University of Melbourne's School of Computing & Information Systems where he serves as Deputy Director of the Academic Centre of Cyber Security Excellence. Atif leads a unique team of Cybersecurity Management researchers drawn from information systems, business administration, security intelligence, and information warfare. He has authored over 100 scholarly articles in cybersecurity management including 20 journal articles ranked in Q1, the top quartile of quality. Atif has received over AUD$5M in grant funding from the Australian Research Council, the Australian Department of Foreign Affairs and Trade, the Menzies Foundation, and Australian Defence. Atif is an associate editor for the leading IT security journal, Computers & Security. Atif has developed and co-produced multi-award-winning films (including "best original screenplay" at the London International Film Festival) showcasing cyber practices in the industry. He has previously served as a cybersecurity consultant for WorleyParsons, Pinkerton, and SinclairKnightMerz. Atif is a certified protection professional with the American Society for Industrial Security. For more information, please visit https://www.atifahmad.me/.
Kim-Kwang Raymond Choo (Ph.D.) received the Ph.D. in Information Security in 2006 from Queensland University of Technology, Australia. He currently holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio. He is the founding co-editor-inchief of ACM Distributed Ledger Technologies: Research & Practice, and the founding chair of IEEE Technology and Engineering Management Society Technical Committee (TC) on Blockchain and Distributed Ledger Technologies. He is the recipient of the 2022 IEEE Hyper-Intelligence TC Award for Excellence in Hyper-Intelligence Systems (Technical Achievement award), the 2022 IEEE TC on Homeland Security Research and Innovation Award, the 2022 IEEE TC on Secure and Dependable Measurement Mid-Career Award, and the 2019 IEEE TC on Scalable Computing Award for Excellence in Scalable Computing (Middle Career Researcher).
Saqib Hakak (Ph.D.) is currently a tenure-track assistant professor with the Faculty of Computer Science, Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB). He has more than five years of industry and academic experience. He has recently made it to the list of the top 2% of world researchers list for the year 2022, compiled annually by Stanford University. His current research interests include cybersecurity, data mining, applications of artificial intelligence, and emerging technologies. He has received a number of gold/silver awards in international innovation competitions. He is currently serving as an associate editor and a technical committee member/reviewer of several reputed conferences.


Dettagli sul prodotto

Con la collaborazione di Atif Ahmad (Editore), Awad Ali Ismail (Editore), Choo Kim-Kwang Raymond (Editore), Saqib Hakak (Editore)
Editore Taylor and Francis
 
Lingue Inglese
Formato Tascabile
Pubblicazione 27.06.2025
 
EAN 9781032058306
ISBN 978-1-032-05830-6
Pagine 238
Illustrazioni schwarz-weiss Illustrationen, Raster,schwarz-weiss, Zeichnungen, schwarz-weiss, Tabellen, schwarz-weiss
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Tematiche generali, enciclopedie

COMPUTERS / Security / General, LAW / Computer & Internet, computer hardware, Computer security, Legal aspects of IT, COMPUTERS / Social Aspects, Digital and information technologies: Legal aspects, COMPUTERS / Internet of Things (IoT), Interrelated smart technologies, Internet of Things;Security;Privacy

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.