Internet of Things Security and Privacy -

Internet of Things Security and Privacy

Practical and Management Perspectives
Buch | Hardcover
238 Seiten
2023
CRC Press (Verlag)
978-1-032-05771-2 (ISBN)
189,95 inkl. MwSt
The Internet of Things (IoT) has emerged due to information and communication technology developments, expanding the ability to connect numerous objects.
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems.

The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course.

Ali Ismail Awad (Ph.D., SMIEEE, MACM) is currently an associate professor with the College of Information Technology (CIT), United Arab Emirates University (UAEU), Al Ain, United Arab Emirates. He has been coordinating the Master’s Program in Information Security at the same institution since 2022. Dr. Awad is an associate professor with the Electrical Engineering Department, Faculty of Engineering, Al-Azhar University at Qena, Egypt. He is also a visiting researcher at the University of Plymouth, United Kingdom. Dr. Awad was an associate professor (Docent) with the Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå , Sweden, where he coordinated the Master’s Program in Information Security from 2017 to 2020. His research interests include cybersecurity, network security, IoT security, and image analysis with biometrics and medical imaging applications. Dr. Awad has edited or co-edited several books and authored or co-authored several journal articles and conference papers in these areas. He is an editorial board member of the Future Generation Computer Systems Journal, Computers & Security Journal, The Internet of Things, Engineering Cyber-Physical Human Systems Journal, The Health Information Science and Systems Journal, and The Security, Privacy and Authentication section of Frontiers. Dr. Awad is currently an IEEE senior member and an ACM Professional Member. Atif Ahmad (Ph.D., CPP) is an associate professor at the University of Melbourne’s School of Computing & Information Systems where he serves as Deputy Director of the Academic Centre of Cyber Security Excellence. Atif leads a unique team of Cybersecurity Management researchers drawn from information systems, business administration, security intelligence, and information warfare. He has authored over 100 scholarly articles in cybersecurity management including 20 journal articles ranked in Q1, the top quartile of quality. Atif has received over AUD$5M in grant funding from the Australian Research Council, the Australian Department of Foreign Affairs and Trade, the Menzies Foundation, and Australian Defence. Atif is an associate editor for the leading IT security journal, Computers & Security. Atif has developed and co-produced multi-award-winning films (including “best original screenplay” at the London International Film Festival) showcasing cyber practices in the industry. He has previously served as a cybersecurity consultant for WorleyParsons, Pinkerton, and SinclairKnightMerz. Atif is a certified protection professional with the American Society for Industrial Security. For more information, please visit https://www.atifahmad.me/. Kim-Kwang Raymond Choo (Ph.D.) received the Ph.D. in Information Security in 2006 from Queensland University of Technology, Australia. He currently holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio. He is the founding co-editor-inchief of ACM Distributed Ledger Technologies: Research & Practice, and the founding chair of IEEE Technology and Engineering Management Society Technical Committee (TC) on Blockchain and Distributed Ledger Technologies. He is the recipient of the 2022 IEEE Hyper-Intelligence TC Award for Excellence in Hyper-Intelligence Systems (Technical Achievement award), the 2022 IEEE TC on Homeland Security Research and Innovation Award, the 2022 IEEE TC on Secure and Dependable Measurement Mid-Career Award, and the 2019 IEEE TC on Scalable Computing Award for Excellence in Scalable Computing (Middle Career Researcher). Saqib Hakak (Ph.D.) is currently a tenure-track assistant professor with the Faculty of Computer Science, Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB). He has more than five years of industry and academic experience. He has recently made it to the list of the top 2% of world researchers list for the year 2022, compiled annually by Stanford University. His current research interests include cybersecurity, data mining, applications of artificial intelligence, and emerging technologies. He has received a number of gold/silver awards in international innovation competitions. He is currently serving as an associate editor and a technical committee member/reviewer of several reputed conferences.

1. Cybersecurity Risk Assessment in Advanced Metering Infrastructure. 2. A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices. 3. A Physical-Layer Approach for IoT Information Security During Interference Attacks. 4. Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure. 5. A Privacy-Sensitive, Situation-Aware Description Model for IoT. 6. Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart Locks. 7. A Game-Theoretic Approach to Information Availability in IoT Networks. 8. Review on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical Systems. 9.Privacy-Preserving Analytics of IoT Data Using Generative Models

Erscheinungsdatum
Zusatzinfo 24 Tables, black and white; 53 Line drawings, black and white; 5 Halftones, black and white; 58 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 548 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Hardware
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Technik Elektrotechnik / Energietechnik
Technik Umwelttechnik / Biotechnologie
ISBN-10 1-032-05771-8 / 1032057718
ISBN-13 978-1-032-05771-2 / 9781032057712
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00