Security of Internet of Things Nodes (eBook, PDF)
Challenges, Attacks, and Countermeasures
Redaktion: Chakraborty, Chinmay; Rehman, Muhammad Habibur; Ranjani Rajendran, Sree
55,95 €
55,95 €
inkl. MwSt.
Sofort per Download lieferbar
28 °P sammeln
55,95 €
Als Download kaufen
55,95 €
inkl. MwSt.
Sofort per Download lieferbar
28 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
55,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
28 °P sammeln
Security of Internet of Things Nodes (eBook, PDF)
Challenges, Attacks, and Countermeasures
Redaktion: Chakraborty, Chinmay; Rehman, Muhammad Habibur; Ranjani Rajendran, Sree
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures ® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things .
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 23.07MB
Andere Kunden interessierten sich auch für
- Machine Learning, Deep Learning, Big Data, and Internet of Things for Healthcare (eBook, PDF)47,95 €
- Preeti MishraCloud Security (eBook, PDF)54,95 €
- Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (eBook, PDF)51,95 €
- Intelligent Cyber-Physical Systems Security for Industry 4.0 (eBook, PDF)54,95 €
- Shaoliang PengBlockchain for Big Data (eBook, PDF)47,95 €
- Computing Technologies and Applications (eBook, PDF)57,95 €
- Charles F. BowmanHow Things Work (eBook, PDF)51,95 €
-
-
-
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 320
- Erscheinungstermin: 30. August 2021
- Englisch
- ISBN-13: 9781000421729
- Artikelnr.: 62247078
- Verlag: Taylor & Francis
- Seitenzahl: 320
- Erscheinungstermin: 30. August 2021
- Englisch
- ISBN-13: 9781000421729
- Artikelnr.: 62247078
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Dr. Chinmay Chakraborty is an Assistant Professor (Sr.) in the Department of Electronics and Communication Engineering, BIT Mesra, India. His primary areas of research include Wireless body area network, Internet of Medical Things, point-of-care diagnosis, Wireless Networks, Telemedicine, m-Health/e-health, and Medical imaging. Dr.Sree Ranjani Rajendran is Passionate and curious researcher, in pursuit of knowledge and expertise in the broader domain of Hardware Security, with specific interest in "Design for a secured hardware".10+ Years of professional experience comprising research and university teaching. Presently, a Post-doctoral Researcher at the Indian Institute of Technology Madras, engaged in the "Detection of Hardware Trojans in AES module using a Formal Verification method". Dr.M. H. Rehman is currently working as a Research scientist at Khalifa University of Science and Technology in UAE. Overall, he has authored/co-authored 42 international publications including journal articles, conference proceedings, book chapters, and peer-reviewed magazine articles. His research interests include blockchain technologies, artificial intelligence, cyber-physical systems, differential privacy, big data, edge computing, and industrial IoT.
Securing Dedicated DSP Co-processors (Hardware IP) using Structural
Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number
Generator for IoT devices using Memristor. Secured Testing of AES
Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication
for IoT Enabled Devices and Applications. An improved verification scheme
based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the
Edge Nodes of IoT System. Lightweight Security solutions for IoT using
Physical Layer Key Generation. Threat and attack models in IoT devices.
Review on Hardware attacks and security challenges in IoT Edge nodes. Study
of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling
and Attack Analysis for IoT Applications. Trust management in Internet of
Things devices
Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number
Generator for IoT devices using Memristor. Secured Testing of AES
Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication
for IoT Enabled Devices and Applications. An improved verification scheme
based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the
Edge Nodes of IoT System. Lightweight Security solutions for IoT using
Physical Layer Key Generation. Threat and attack models in IoT devices.
Review on Hardware attacks and security challenges in IoT Edge nodes. Study
of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling
and Attack Analysis for IoT Applications. Trust management in Internet of
Things devices
Securing Dedicated DSP Co-processors (Hardware IP) using Structural
Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number
Generator for IoT devices using Memristor. Secured Testing of AES
Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication
for IoT Enabled Devices and Applications. An improved verification scheme
based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the
Edge Nodes of IoT System. Lightweight Security solutions for IoT using
Physical Layer Key Generation. Threat and attack models in IoT devices.
Review on Hardware attacks and security challenges in IoT Edge nodes. Study
of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling
and Attack Analysis for IoT Applications. Trust management in Internet of
Things devices
Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number
Generator for IoT devices using Memristor. Secured Testing of AES
Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication
for IoT Enabled Devices and Applications. An improved verification scheme
based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the
Edge Nodes of IoT System. Lightweight Security solutions for IoT using
Physical Layer Key Generation. Threat and attack models in IoT devices.
Review on Hardware attacks and security challenges in IoT Edge nodes. Study
of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling
and Attack Analysis for IoT Applications. Trust management in Internet of
Things devices