Internet of Things Security and Privacy (eBook, ePUB)
Practical and Management Perspectives
Redaktion: Awad, Ali Ismail; Hakak, Saqib; Choo, Kim-Kwang Raymond; Ahmad, Atif
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Internet of Things Security and Privacy (eBook, ePUB)
Practical and Management Perspectives
Redaktion: Awad, Ali Ismail; Hakak, Saqib; Choo, Kim-Kwang Raymond; Ahmad, Atif
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The Internet of Things (IoT) has emerged due to information and communication technology developments, expanding the ability to connect numerous objects.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 9.51MB
The Internet of Things (IoT) has emerged due to information and communication technology developments, expanding the ability to connect numerous objects.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 258
- Erscheinungstermin: 6. Dezember 2023
- Englisch
- ISBN-13: 9781003810278
- Artikelnr.: 69227262
- Verlag: Taylor & Francis
- Seitenzahl: 258
- Erscheinungstermin: 6. Dezember 2023
- Englisch
- ISBN-13: 9781003810278
- Artikelnr.: 69227262
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Ali Ismail Awad (Ph.D., SMIEEE, MACM) is currently an associate professor with the College of Information Technology (CIT), United Arab Emirates University (UAEU), Al Ain, United Arab Emirates. He has been coordinating the Master's Program in Information Security at the same institution since 2022. Dr. Awad is an associate professor with the Electrical Engineering Department, Faculty of Engineering, Al-Azhar University at Qena, Egypt. He is also a visiting researcher at the University of Plymouth, United Kingdom. Dr. Awad was an associate professor (Docent) with the Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå , Sweden, where he coordinated the Master's Program in Information Security from 2017 to 2020. His research interests include cybersecurity, network security, IoT security, and image analysis with biometrics and medical imaging applications. Dr. Awad has edited or co-edited several books and authored or co-authored several journal articles and conference papers in these areas. He is an editorial board member of the Future Generation Computer Systems Journal, Computers & Security Journal, The Internet of Things, Engineering Cyber-Physical Human Systems Journal, The Health Information Science and Systems Journal, and The Security, Privacy and Authentication section of Frontiers. Dr. Awad is currently an IEEE senior member and an ACM Professional Member. Atif Ahmad (Ph.D., CPP) is an associate professor at the University of Melbourne's School of Computing & Information Systems where he serves as Deputy Director of the Academic Centre of Cyber Security Excellence. Atif leads a unique team of Cybersecurity Management researchers drawn from information systems, business administration, security intelligence, and information warfare. He has authored over 100 scholarly articles in cybersecurity management including 20 journal articles ranked in Q1, the top quartile of quality. Atif has received over AUD$5M in grant funding from the Australian Research Council, the Australian Department of Foreign Affairs and Trade, the Menzies Foundation, and Australian Defence. Atif is an associate editor for the leading IT security journal, Computers & Security. Atif has developed and co-produced multi-award-winning films (including "best original screenplay" at the London International Film Festival) showcasing cyber practices in the industry. He has previously served as a cybersecurity consultant for WorleyParsons, Pinkerton, and SinclairKnightMerz. Atif is a certified protection professional with the American Society for Industrial Security. For more information, please visit https://www.atifahmad.me/. Kim-Kwang Raymond Choo (Ph.D.) received the Ph.D. in Information Security in 2006 from Queensland University of Technology, Australia. He currently holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio. He is the founding co-editor-inchief of ACM Distributed Ledger Technologies: Research & Practice, and the founding chair of IEEE Technology and Engineering Management Society Technical Committee (TC) on Blockchain and Distributed Ledger Technologies. He is the recipient of the 2022 IEEE Hyper-Intelligence TC Award for Excellence in Hyper-Intelligence Systems (Technical Achievement award), the 2022 IEEE TC on Homeland Security Research and Innovation Award, the 2022 IEEE TC on Secure and Dependable Measurement Mid-Career Award, and the 2019 IEEE TC on Scalable Computing Award for Excellence in Scalable Computing (Middle Career Researcher). Saqib Hakak (Ph.D.) is currently a tenure-track assistant professor with the Faculty of Computer Science, Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB). He has more than five years of industry and academic experience. He has recently made it to the list of the top 2% of world researchers list for the year 2022, compiled annually by Stanford University. His current research interests include cybersecurity, data mining, applications of artificial intelligence, and emerging technologies. He has received a number of gold/silver awards in international innovation competitions. He is currently serving as an associate editor and a technical committee member/reviewer of several reputed conferences.
1. Cybersecurity Risk Assessment in Advanced Metering Infrastructure. 2. A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices. 3. A Physical-Layer Approach for IoT Information Security During Interference Attacks. 4. Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure. 5. A Privacy-Sensitive, Situation-Aware Description Model for IoT. 6. Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart Locks. 7. A Game-Theoretic Approach to Information Availability in IoT Networks. 8. Review on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical Systems. 9.Privacy-Preserving Analytics of IoT Data Using Generative Models
1. Cybersecurity Risk Assessment in Advanced Metering Infrastructure. 2. A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices. 3. A Physical-Layer Approach for IoT Information Security During Interference Attacks. 4. Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure. 5. A Privacy-Sensitive, Situation-Aware Description Model for IoT. 6. Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart Locks. 7. A Game-Theoretic Approach to Information Availability in IoT Networks. 8. Review on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical Systems. 9.Privacy-Preserving Analytics of IoT Data Using Generative Models