Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations (Record no. 6686)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02107nam a22001697a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250923104605.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250923b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781032707150 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 004.678 |
| Item number | FEI |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Fei, Hu |
| 245 ## - TITLE STATEMENT | |
| Title | Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc. | New York |
| Name of publisher, distributor, etc. | CRC Press |
| Date of publication, distribution, etc. | 2025 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Page No. | xx, 584p. |
| Dimensions | 23 x 17 cm |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Contents: <br/><br/>Section I: Threats and Attacks<br/><br/>1. Internet of Things (IoT) as Interconnection of Threats (IoT)<br/><br/>2. Attack, Defense, and Network Robustness of Internet of Things<br/><br/>3. Sybil Attack Detection in Vehicular Networks<br/><br/>4. Malware Propagation and Control in Internet of Things<br/><br/>5. Solution-Based Analysis of Attack Vectors on Smart Home Systems<br/><br/>Section II: Privacy Preservation<br/><br/>6. Privacy Preservation Data Dissemination<br/><br/>7. Privacy Preservation for IoT Used in Smart Buildings<br/><br/>8. Exploiting Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles<br/><br/>9. Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing<br/><br/>Section III: Trust and Authentication<br/><br/>10. Trust and Trust Models for the IoT<br/><br/>11. Trustable Fellowships of Self-Organizing "Things" and Their Software Representatives: An Emerging Architecture Model for IoT Security and Privacy<br/><br/>12. Preventing Unauthorized Access to Sensor Data<br/><br/>13. Authentication in IoT<br/><br/>Section IV: IOT Data Security<br/><br/>14. Computational Security for the IoT and Beyond<br/><br/>15. Privacy-Preserving Time Series Data Aggregation for Internet of Things<br/><br/>16. A Secure Path Generation Scheme for Real-Time Green Internet of Things<br/><br/>17. Security Protocols for IoT Access Networks<br/><br/>Section V: Social Awareness<br/><br/>18. A User-Centric Decentralized Governance Framework for Privacy and Trust in IoT<br/><br/>19. A Policy-Based Approach for Informed Consent in Internet of Things<br/><br/> 20. Security and Impact of the Internet of Things (IoT) on Mobile Networks |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Reference |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Currency | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Bill Date | Koha item type | Bill Number |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | IOT (Internet of Things) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 19/09/2025 | ₹ | 3995.00 | 004.678 FEI | 97292 | 23/09/2025 | 18/09/2025 | Reference | INV-000002 | |||||
| Dewey Decimal Classification | IOT (Internet of Things) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 19/09/2025 | ₹ | 3995.00 | 004.678 FEI | 97293 | 23/09/2025 | 18/09/2025 | Reference | INV-000002 |
