IoT security paradigms and applications : research and practices

Bibliographische Detailangaben

Titel
IoT security paradigms and applications research and practices
verantwortlich
Sharma, Sudhir Kumar (HerausgeberIn); Bhushan, Bharat (Software specialist) (HerausgeberIn); Debnath, N. C. (HerausgeberIn)
Ausgabe
1st
veröffentlicht
Boca Raton: CRC Press, 2020
Erscheinungsjahr
2020
Teil von
Computational intelligence in engineering problem solving
Medientyp
E-Book
Datenquelle
British National Bibliography
Tags
Tag hinzufügen

Zugang

Für diesen Titel können wir derzeit leider keine weiteren Informationen zur Verfügbarkeit bereitstellen.

LEADER 03909pam a22004571i 4500
001 180-019877995
003 Uk
005 20200901021025.0
006 m || d |
007 cr |||||||||||
008 200805s2020 flua ob 001|0|eng|d
015 |a GBC0A9393  |2 bnb 
020 |a 9781000172287 (ePub ebook) :  |c £44.99 
020 |z 9780367514969 (hbk.) :  |c £115.00 
020 |a 9781000172249 (PDF ebook) :  |c £44.99 
020 |a 9781000172263 (Mobipocket ebook) :  |c £44.99 
020 |a 9781003054115 (ebook) :  |c £44.99 
024 7 |a 10.1201/9781003054115  |2 doi 
037 |a 9781000172287  |b Ingram Content Group 
040 |a StDuBDS  |b eng  |c StDuBDS  |d Uk  |e rda  |e pn 
042 |a ukblsr 
082 0 4 |a 005.83  |2 23 
245 0 0 |a IoT security paradigms and applications  |b research and practices  |c edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath 
250 |a 1st 
264 1 |a Boca Raton  |b CRC Press  |c 2020 
300 |a 1 online resource :  |b illustrations (black and white). 
336 |a text  |2 rdacontent 
336 |a still image  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
490 0 |a Computational intelligence in engineering problem solving 
504 |a Includes bibliographical references and index. 
588 |a Description based on CIP data; resource not viewed. 
505 0 |a <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I> 
650 0 |a Internet of things. 
700 1 |a Sharma, Sudhir Kumar  |e editor. 
700 1 |a Bhushan, Bharat  |c (Software specialist),  |e editor. 
700 1 |a Debnath, N. C.  |q (Narayan C.),  |e editor. 
776 0 8 |i Print version :  |z 9780367514969 
859 |a ELD  |b ebook 
980 |a 019877995  |b 180  |c sid-180-col-bnbfidbbi 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fkatalog.fid-bbi.de%3Agenerator&rft.title=IoT+security+paradigms+and+applications%3A+research+and+practices&rft.date=2020&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=IoT+security+paradigms+and+applications%3A+research+and+practices&rft.series=Computational+intelligence+in+engineering+problem+solving&rft.au=&rft.pub=CRC+Press&rft.edition=1st&rft.isbn=1000172287
SOLR
_version_ 1778756570185728000
access_facet Electronic Resources
author2 Sharma, Sudhir Kumar, Bhushan, Bharat (Software specialist), Debnath, N. C.
author2_fuller (Narayan C.),
author2_role edt, edt, edt
author2_variant s k s sk sks, b b bb, n c d nc ncd
author_facet Sharma, Sudhir Kumar, Bhushan, Bharat (Software specialist), Debnath, N. C.
building Library A
callnumber-sort
collection sid-180-col-bnbfidbbi
contents <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I>
dewey-full 005.83
dewey-hundreds 000 - Computer science, information & general works
dewey-ones 005 - Computer programming, programs & data
dewey-raw 005.83
dewey-search 005.83
dewey-sort 15.83
dewey-tens 000 - Computer science, knowledge & systems
doi_str_mv 10.1201/9781003054115
edition 1st
facet_avail Online
finc_class_facet Informatik
fincclass_txtF_mv science-computerscience
format eBook
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
geogr_code not assigned
geogr_code_person not assigned
id 180-019877995
illustrated Illustrated
imprint Boca Raton, CRC Press, 2020
imprint_str_mv Boca Raton CRC Press 2020
institution FID-BBI-DE-23
is_hierarchy_id
is_hierarchy_title
isbn 9781000172287 (ePub ebook) :, 9781000172249 (PDF ebook) :, 9781000172263 (Mobipocket ebook) :, 9781003054115 (ebook) :
isbn_isn_mv 9780367514969 (hbk.) :, 9780367514969
isil_str_mv FID-BBI-DE-23
language English
last_indexed 2023-10-03T17:34:15.69Z
marc024a_ct_mv 10.1201/9781003054115
match_str sharma2020iotsecurityparadigmsandapplicationsresearchandpractices
mega_collection British National Bibliography
physical 1 online resource; illustrations (black and white)
publishDate 2020
publishDateSort 2020
publishPlace Boca Raton
publisher CRC Press
record_format marcfinc
record_id 019877995
recordtype marcfinc
rvk_facet No subject assigned
series2 Computational intelligence in engineering problem solving
source_id 180
spelling IoT security paradigms and applications research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath, 1st, Boca Raton CRC Press 2020, 1 online resource : illustrations (black and white)., text rdacontent, still image rdacontent, computer rdamedia, online resource rdacarrier, Computational intelligence in engineering problem solving, Includes bibliographical references and index., Description based on CIP data; resource not viewed., <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I>, Internet of things., Sharma, Sudhir Kumar editor., Bhushan, Bharat (Software specialist), editor., Debnath, N. C. (Narayan C.), editor., Print version : 9780367514969, ELD ebook
spellingShingle IoT security paradigms and applications: research and practices, <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I>, Internet of things.
title IoT security paradigms and applications: research and practices
title_auth IoT security paradigms and applications research and practices
title_full IoT security paradigms and applications research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath
title_fullStr IoT security paradigms and applications research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath
title_full_unstemmed IoT security paradigms and applications research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath
title_short IoT security paradigms and applications
title_sort iot security paradigms and applications research and practices
title_sub research and practices
topic Internet of things.
topic_facet Internet of things.