Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations (Record no. 6686)

MARC details
000 -LEADER
fixed length control field 02107nam a22001697a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250923104605.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250923b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032707150
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.678
Item number FEI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Fei, Hu
245 ## - TITLE STATEMENT
Title Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New York
Name of publisher, distributor, etc. CRC Press
Date of publication, distribution, etc. 2025
300 ## - PHYSICAL DESCRIPTION
Page No. xx, 584p.
Dimensions 23 x 17 cm
520 ## - SUMMARY, ETC.
Summary, etc. Contents: <br/><br/>Section I: Threats and Attacks<br/><br/>1. Internet of Things (IoT) as Interconnection of Threats (IoT)<br/><br/>2. Attack, Defense, and Network Robustness of Internet of Things<br/><br/>3. Sybil Attack Detection in Vehicular Networks<br/><br/>4. Malware Propagation and Control in Internet of Things<br/><br/>5. Solution-Based Analysis of Attack Vectors on Smart Home Systems<br/><br/>Section II: Privacy Preservation<br/><br/>6. Privacy Preservation Data Dissemination<br/><br/>7. Privacy Preservation for IoT Used in Smart Buildings<br/><br/>8. Exploiting Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles<br/><br/>9. Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing<br/><br/>Section III: Trust and Authentication<br/><br/>10. Trust and Trust Models for the IoT<br/><br/>11. Trustable Fellowships of Self-Organizing "Things" and Their Software Representatives: An Emerging Architecture Model for IoT Security and Privacy<br/><br/>12. Preventing Unauthorized Access to Sensor Data<br/><br/>13. Authentication in IoT<br/><br/>Section IV: IOT Data Security<br/><br/>14. Computational Security for the IoT and Beyond<br/><br/>15. Privacy-Preserving Time Series Data Aggregation for Internet of Things<br/><br/>16. A Secure Path Generation Scheme for Real-Time Green Internet of Things<br/><br/>17. Security Protocols for IoT Access Networks<br/><br/>Section V: Social Awareness<br/><br/>18. A User-Centric Decentralized Governance Framework for Privacy and Trust in IoT<br/><br/>19. A Policy-Based Approach for Informed Consent in Internet of Things<br/><br/> 20. Security and Impact of the Internet of Things (IoT) on Mobile Networks
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Reference
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Currency Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Bill Date Koha item type Bill Number
    Dewey Decimal Classification     IOT (Internet of Things) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 19/09/2025 3995.00   004.678 FEI 97292 23/09/2025 18/09/2025 Reference INV-000002
    Dewey Decimal Classification     IOT (Internet of Things) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 19/09/2025 3995.00   004.678 FEI 97293 23/09/2025 18/09/2025 Reference INV-000002
Implemented & Customized by: BestBookBuddies

Powered by Koha