IoT Cybersecurity: Trends, Challenges, and Solutions: Advances in Computational Collective Intelligence
Editat de Laxmi Shaw, D. Ajitha, Chinmay Chakraborty, S.M. Prabinen Limba Engleză Hardback – 30 apr 2026
- An efficient lightweight cryptography technique for enhancing IoT security
- Machine learning approaches for IoT network threat detection and security optimization
- Using AI to enhance IoT-based intrusion detection systems
- A study on emerging threats and vulnerabilities
Din seria Advances in Computational Collective Intelligence
- 20%
Preț: 571.32 lei - 20%
Preț: 1094.86 lei - 20%
Preț: 366.28 lei -
Preț: 401.23 lei - 20%
Preț: 484.25 lei -
Preț: 405.43 lei - 20%
Preț: 393.16 lei -
Preț: 459.05 lei -
Preț: 450.08 lei - 20%
Preț: 388.61 lei - 20%
Preț: 1396.09 lei - 20%
Preț: 1240.41 lei - 5%
Preț: 688.28 lei - 5%
Preț: 1065.89 lei - 18%
Preț: 1293.61 lei - 20%
Preț: 1235.16 lei - 20%
Preț: 1347.34 lei - 20%
Preț: 1463.36 lei - 20%
Preț: 1126.49 lei - 20%
Preț: 1289.17 lei - 20%
Preț: 1124.04 lei - 20%
Preț: 1118.45 lei - 20%
Preț: 1178.39 lei - 5%
Preț: 635.50 lei - 35%
Preț: 863.46 lei
Preț: 928.29 lei
Preț vechi: 1315.68 lei
-29% Precomandă
Puncte Express: 1392
Preț estimativ în valută:
164.40€ • 191.100$ • 142.81£
164.40€ • 191.100$ • 142.81£
Carte nepublicată încă
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781032958781
ISBN-10: 1032958782
Pagini: 248
Ilustrații: 82
Dimensiuni: 156 x 234 mm
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Seria Advances in Computational Collective Intelligence
ISBN-10: 1032958782
Pagini: 248
Ilustrații: 82
Dimensiuni: 156 x 234 mm
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Seria Advances in Computational Collective Intelligence
Public țintă
PostgraduateCuprins
1. An Efficient Lightweight Cryptography Technique for Enhancing IoT Security 2. Enhancement of IoT-Based Intrusion Detection Systems by AI and ML Methodologies 3. Hardware Trojan Vulnerability in IoT End Devices: A Walkthrough 4. Securing the Internet of Things: Proactive Firewalls and the Challenges of Big Data 5. The Human Firewall: Strengthening IoT Security Through Behavior 6. Enhancing IoT Security with Cryptographic Approach 7. Cybersecurity Challenges on the Internet of Things: A Study on Emerging Threats and Vulnerabilities 8. Synergizing Machine Learning and Artificial Intelligence in Internet of Things Environments: Transformative Applications and Future Direction 9. Intelligent Machine Learning Approaches for IoT Network Threat Detection and Security Optimization 10. A Comprehensive Review of AI and IoT-Based Systems for Intelligent Accident Management and Response 11. Navigating the Future of IoT Security: Emerging Trends, Challenges and Strategic Solutions
Notă biografică
Dr. Laxmi Shaw is a senior postdoctoral fellow in the Dell Medical School at the University of Texas at Austin. Her primary research interests encompass pattern recognition, cognitive and neuroscience, IoT-based cloud computing, computer vision, and machine learning.
Dr. D. Ajitha is an Associate Professor in School of Computer Science and Engineering, Vellore Institute of Technology, India.
Dr. Chinmay Chakraborty is part of the Electronics & Communication Engineering department at Birla Institute of Technology, India.
Dr. S.M. Prabin is an Assistant Professor Senior Grade in the Department of Computer Science and Engineering at the Vellore Institute of Technology.
Dr. D. Ajitha is an Associate Professor in School of Computer Science and Engineering, Vellore Institute of Technology, India.
Dr. Chinmay Chakraborty is part of the Electronics & Communication Engineering department at Birla Institute of Technology, India.
Dr. S.M. Prabin is an Assistant Professor Senior Grade in the Department of Computer Science and Engineering at the Vellore Institute of Technology.
Descriere
The connected nature of devices within the Internet of Things (IoT) has ushered in unprecedented opportunities, as well as formidable challenges in ensuring robust cybersecurity. This edited book presents research and insights into practice that explore the current patterns, difficulties, and effective solutions for IoT cybersecurity.