Internet of things - Security measures.
Overview
| Works: | 62 works in 52 publications in 52 languages | |
|---|---|---|
Titles
Physically unclonable functions = from basic design principles to advanced hardware security applications /
by:
(Electronic resources)
The IoT hacker's handbook = a practical guide to hacking the internet of things /
by:
(Electronic resources)
Women securing the future with TIPPSS for IoT = trust, identity, privacy, protection, safety, security for the internet of things /
by:
(Electronic resources)
Internet of Things and access control = sensing, monitoring and controlling access in IoT-enabled healthcare systems /
by:
(Electronic resources)
Challenges in the IoT and smart environments = a practitioners' guide to security, ethics and criminal threats /
by:
(Electronic resources)
Blockchain, artificial intelligence, and the Internet of things = possibilities and opportunities /
by:
(Electronic resources)
Security and privacy preserving for IoT and 5G networks = techniques, challenges, and new directions /
by:
(Electronic resources)
Privacy preservation in IoT = machine learning approaches : a comprehensive survey and use cases /
by:
(Electronic resources)
Women securing the future with TIPPSS for connected healthcare = trust, identity, privacy, protection, safety, security /
by:
(Electronic resources)
Security, trust and privacy models, and architectures in IoT environments
by:
(Electronic resources)
AI models for blockchain-based intelligent networks in IoT systems = concepts, methodologies, tools, and applications /
by:
(Electronic resources)
Modern approaches in iot and machine learning for cyber security = latest trends in AI /
by:
(Electronic resources)
Communication technologies and security challenges in IoT = present and future /
by:
(Electronic resources)
Design and deploy Microsoft Defender for IoT = leveraging cloud-based analytics and machine learning capabilities /
by:
(Electronic resources)
Security framework and defense mechanisms for IoT reactive jamming attacks
by:
(Electronic resources)
Design and deploy IoT network & security with Microsoft Azure = embrace Microsoft Azure for IoT network enhancement and security uplift /
by:
(Electronic resources)
Deception in autonomous transport systems = threats, impacts and mitigation policies /
by:
(Electronic resources)
The Huawei and Snowden questions = Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment? /
by:
(Electronic resources)
Defending IoT infrastructures with the Raspberry Pi = monitoring and detecting nefarious behavior in real time /
by:
(Electronic resources)
The Iot hacker's handbook : = a practical guide to hacking the internet of things /
by:
(Language materials, printed)
Securing the Internet of Things = concepts, methodologies, tools, and applications /
by:
(Electronic resources)
Demystifying Internet of Things security = successful IoT device/Edge and platform security deployment /
by:
(Electronic resources)
IoT supply chain security risk analysis and mitigation = modeling, computations, and software tools /
by:
(Electronic resources)
Predictive data security using AI = insights and issues of blockchain, IoT, and DevOps /
by:
(Electronic resources)
Security and privacy in the Internet of things = architectures, techniques, and applications /
by:
(Electronic resources)
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
by:
(Electronic resources)
Cybersecurity vigilance and security engineering of Internet of everything
by:
(Electronic resources)
Show more
Fewer
Subjects