語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber threat intelligence for the In...
~
Bou-Harb, Elias.
Cyber threat intelligence for the Internet of Things
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cyber threat intelligence for the Internet of Thingsby Elias Bou-Harb, Nataliia Neshenko.
作者:
Bou-Harb, Elias.
其他作者:
Neshenko, Nataliia.
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
x, 89 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Internet of thingsSecurity measures.
電子資源:
https://doi.org/10.1007/978-3-030-45858-4
ISBN:
9783030458584$q(electronic bk.)
Cyber threat intelligence for the Internet of Things
Bou-Harb, Elias.
Cyber threat intelligence for the Internet of Things
[electronic resource] /by Elias Bou-Harb, Nataliia Neshenko. - Cham :Springer International Publishing :2020. - x, 89 p. :ill., digital ;24 cm.
Introduction -- Taxonomy of IoT Vulnerabilities -- Towards Inferring IoT Maliciousness -- Generating and sharing IoT-centric Cyber Threat Intelligence -- Concluding Remarks and Future Perspective.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a
ISBN: 9783030458584$q(electronic bk.)
Standard No.: 10.1007/978-3-030-45858-4doiSubjects--Topical Terms:
770009
Internet of things
--Security measures.
LC Class. No.: TK5105.8857 / .B684 2020
Dewey Class. No.: 004.678
Cyber threat intelligence for the Internet of Things
LDR
:02814nmm a2200325 a 4500
001
579516
003
DE-He213
005
20200530080518.0
006
m
007
cr
008
201229s2020
020
$a
9783030458584$q(electronic bk.)
020
$a
9783030458577$q(paper)
024
7
$a
10.1007/978-3-030-45858-4
$2
doi
035
$a
978-3-030-45858-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8857
$b
.B684 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
004.678
$2
23
090
$a
TK5105.8857
$b
.B752 2020
100
1
$a
Bou-Harb, Elias.
$3
868902
245
1 0
$a
Cyber threat intelligence for the Internet of Things
$h
[electronic resource] /
$c
by Elias Bou-Harb, Nataliia Neshenko.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
x, 89 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Taxonomy of IoT Vulnerabilities -- Towards Inferring IoT Maliciousness -- Generating and sharing IoT-centric Cyber Threat Intelligence -- Concluding Remarks and Future Perspective.
520
$a
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a
$2
67 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.
650
0
$a
Internet of things
$x
Security measures.
$3
770009
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Artificial Intelligence.
$3
212515
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
700
1
$a
Neshenko, Nataliia.
$3
868903
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-030-45858-4
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000184102
電子館藏
1圖書
電子書
EB TK5105.8857 .B752 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-45858-4
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入