Computers & Internet Books:

Security Framework for The Internet of Things Applications

Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!
$231.00
Releases

Pre-order to reserve stock from our first shipment. Your credit card will not be charged until your order is ready to ship.

Available for pre-order now
Free Delivery with Primate
Join Now

Free 14 day free trial, cancel anytime.

Buy Now, Pay Later with:

4 payments of $57.75 with Afterpay Learn more

6 weekly interest-free payments of $38.50 with Laybuy Learn more

Pre-order Price Guarantee

If you pre-order an item and the price drops before the release date, you'll pay the lowest price. This happens automatically when you pre-order and pay by credit card or pickup.

If paying by PayPal, Afterpay, Laybuy, Zip, Klarna, POLi, Online EFTPOS or internet banking, and the price drops after you have paid, you can ask for the difference to be refunded.

If Mighty Ape's price changes before release, you'll pay the lowest price.

Availability

This product will be released on

Delivering to:

It should arrive:

  • 5-12 June using International Courier

Description

The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges. It further covers three security aspects including Internet of Things device identification and authentication, network traffic intrusion detection, and executable malware files detection. This book: Presents a security framework model design named Behavioral Network Traffic Identification and Novelty Anomaly Detection for the IoT Infrastructures. Highlights recent advancements in machine learning, deep learning, and networking standards to boost Internet of Things security. Builds a near real-time solution for identifying Internet of Things devices connecting to a network using their network traffic traces and providing them with sufficient access privileges. Develops a robust framework for detecting IoT anomalous network traffic. Covers an anti-malware solution for detecting malware targeting embedded devices. It will serve as an ideal text for senior undergraduate and graduate students, and professionals in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology.

Author Biography:

Salma Abdalla Hamad is currently an Information Security Manager at a financial firm. She received a Ph.D. degree in Computer Science from Macquarie University, Sydney, Australia in 2021. She worked under the supervision of Professor Michael Sheng and Dr. Wei Emma Zhang. Salma obtained her bachelor’s and master’s degrees in Electronics and Communication Engineering from Arab Academy for Science, Technology, and Maritime Transport, Egypt with distinctions in 2005 and 2009, respectively. Salma also possesses more than 18 years of working experience in both the government sector and the financial sector, where she executed several projects pertinent to Information Security. Her research interests are concentrated in the domain of Information Security, more specifically, for the Internet of Things, Smart Cities, and Smart Homes. Quan Z. Sheng is a full Professor and Head of the Department of Computing at Macquarie University, Sydney, Australia. His research interests include the Internet of Things, service-oriented computing, distributed computing, Internet computing, and pervasive computing. Professor Sheng holds a Ph.D. degree in Computer Science from the University of New South Wales (UNSW) and did his post-doc as a research scientist at CSIRO ICT Centre. Professor Sheng is the recipient of the AMiner Most Influential Scholar in IoT Award in 2019, the ARC Future Fellowship in 2014, the Chris Wallace Award for Outstanding Research Contribution in 2012, and a Microsoft fellowship in 2003. Wei Emma Zhang is currently a Lecturer in the School of Computer Science, at the University of Adelaide. Her research interests include the Internet of Things, text mining, data mining, and knowledge base. She received a Ph.D. degree in Computer Science from the University of Adelaide in 2017. She has authored and co-authored more than 50 papers. She has also served on various conference committees and international journals in different roles such as track chair, proceeding chair, PC member, and reviewer. She is a member of the IEEE and ACM.
Release date NZ
May 29th, 2024
Pages
134
Audiences
  • Professional & Vocational
  • Tertiary Education (US: College)
Illustrations
11 Tables, black and white; 24 Line drawings, black and white; 5 Halftones, black and white; 29 Illustrations, black and white
ISBN-13
9781032409276
Product ID
38433898

Customer previews

Nobody has previewed this product yet. You could be the first!

Write a Preview

Help & options

Filed under...