This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS). In addition, the book presents a detailed analysis of the recent approaches to security solutions and future research directions for large-scale CPS, including its various challenges and significant security requirements. Furthermore, the book provides practical guidance on delivering robust, privacy, and trust-aware CPS at scale. Finally, the book presents a holistic insight into IoT technologies, particularly its latest development…mehr
This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS). In addition, the book presents a detailed analysis of the recent approaches to security solutions and future research directions for large-scale CPS, including its various challenges and significant security requirements. Furthermore, the book provides practical guidance on delivering robust, privacy, and trust-aware CPS at scale. Finally, the book presents a holistic insight into IoT technologies, particularly its latest development in strategic applications in mission-critical systems, including large-scale Industrial IoT, Industry 4.0, and Industrial Control Systems. As such, the book offers an essential reference guide about the latest design and development in CPS for students, engineers, designers, and professional developers.
Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing.- System Identification Methods for Industrial Control Systems.- Vulnerability Management in IIoT-based systems: What, Why and How.- Review of Cyber Security for Power Trading and Communication Systems.- DDoS Threats and Solutions for 5G-Enabled IoT Networks.- A Lightweight Blockchain-Based Trust Management Framework for Access Control in IoT.- Utilising K-means Clustering and Naive Bayes for IoT Anomaly Detection: A Hybrid Approach.
Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing.- System Identification Methods for Industrial Control Systems.- Vulnerability Management in IIoT-based systems: What, Why and How.- Review of Cyber Security for Power Trading and Communication Systems.- DDoS Threats and Solutions for 5G-Enabled IoT Networks.- A Lightweight Blockchain-Based Trust Management Framework for Access Control in IoT.- Utilising K-means Clustering and Naive Bayes for IoT Anomaly Detection: A Hybrid Approach.
Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing.- System Identification Methods for Industrial Control Systems.- Vulnerability Management in IIoT-based systems: What, Why and How.- Review of Cyber Security for Power Trading and Communication Systems.- DDoS Threats and Solutions for 5G-Enabled IoT Networks.- A Lightweight Blockchain-Based Trust Management Framework for Access Control in IoT.- Utilising K-means Clustering and Naive Bayes for IoT Anomaly Detection: A Hybrid Approach.
Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing.- System Identification Methods for Industrial Control Systems.- Vulnerability Management in IIoT-based systems: What, Why and How.- Review of Cyber Security for Power Trading and Communication Systems.- DDoS Threats and Solutions for 5G-Enabled IoT Networks.- A Lightweight Blockchain-Based Trust Management Framework for Access Control in IoT.- Utilising K-means Clustering and Naive Bayes for IoT Anomaly Detection: A Hybrid Approach.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG i.I. Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309