Recent Advances in Internet of Things Security (eBook, PDF)
Redaktion: Azrour, Mourade; Mabrouki, Jamal
51,95 €
51,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
51,95 €
Als Download kaufen
51,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
51,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Recent Advances in Internet of Things Security (eBook, PDF)
Redaktion: Azrour, Mourade; Mabrouki, Jamal
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Recent Advances in Internet of Things Security discusses the critical importance of robust security frameworks to protect Internet of Things ecosystems against various cyber threats. It highlights the security risks associated with Internet of Things devices and applications and present a variety of potential solutions.
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 23.69MB
Andere Kunden interessierten sich auch für
- Akashdeep BhardwajInsecure Digital Frontiers (eBook, PDF)46,95 €
- Agile Security in the Digital Era (eBook, PDF)54,95 €
- Mariya OuaissaOffensive and Defensive Cyber Security Strategies (eBook, PDF)31,95 €
- Claudia LanzaRansomware Analysis (eBook, PDF)0,00 €
- Andres AndreuThe CISO Playbook (eBook, PDF)45,95 €
- Baihe MaPrivacy in Vehicular Networks (eBook, PDF)50,95 €
- Security Issues in Communication Devices, Networks and Computing Models (eBook, PDF)51,95 €
-
-
-
Recent Advances in Internet of Things Security discusses the critical importance of robust security frameworks to protect Internet of Things ecosystems against various cyber threats. It highlights the security risks associated with Internet of Things devices and applications and present a variety of potential solutions.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 230
- Erscheinungstermin: 6. Mai 2025
- Englisch
- ISBN-13: 9781040351888
- Artikelnr.: 73747399
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 230
- Erscheinungstermin: 6. Mai 2025
- Englisch
- ISBN-13: 9781040351888
- Artikelnr.: 73747399
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Prof. Mourade Azrour received his PhD from Faculty of sciences and Techniques, Moulay Ismail University of Meknes, Morocco. He has received his MS in computer and distributed systems from Faculty of Sciences, Ibn Zouhr University, Agadir, Morocco in 2014. Mourade currently works as computer sciences professor at the Department of Computer Science, Faculty of Sciences and Techniques, Moulay Ismail University of Meknès. His research interests include Authentication protocol, Computer Security, Internet of things, Smart systems, Machine learning and so ones. Mourade is member of the scientific committee of numerous international conferences. He is also a reviewer of various scientific journals. He has published more than 120 scientific papers and book chapters. Mourade Has edited various scientific books such as "IoT and Smart Devices for Sustainable Environment " and "Advanced Technology for Smart Environment and Energy". Finally, he has served as guest editor in journals "EAI Endorsed Transactions on Internet of Things", "Tsinghua Science and Technology", "Applied Sciences MDPI" and "Sustainability MDPI" Prof. Jamal Mabrouki received his PhD in Process and Environmental Engineering at Mohammed V University in Rabat, specializing in artificial intelligence and smart automatic systems. He completed the Bachelor of Science in Physics and Chemistry with honors from Hassan II University in Casablanca, Morocco and the engineer in Environment and smart system. His research is on intelligent monitoring, control, and management systems and more particularly on sensing and supervising remote intoxication systems, smart self-supervised systems and recurrent neural networks. He has published several papers in conferences and indexed journals, most of them related to artificial intelligent systems, internet of things or big data and mining. Jamal will currently work in environment, energy and smart system professor at Mohammed V University in Rabat, Faculty of Science. Jamal is scientific committee member of numerous national and international conferences. He is also a reviewer of Modeling Earth Systems and Environment; International Journal of Environmental Analytical Chemistry; International Journal of Modeling, Simulation, and Scientific Computing; The Journal of Supercomputing, Energy & Environment and Big Data Mining and Analytics.
Chapter 1 Strengthening IIoT security: Integrating intrusion detection
systems with machine learning Chapter 2 Scalable IoT anomaly detection:
Federated and split learning Chapter 3 Machine learning-based detection in
wireless sensor networks Chapter 4 A secure approach for next-generation
IoT networks: A comparative analysis Chapter 5 Efficient ECC-based RFID
authentication for enhanced IoT security Chapter 6 An AI-based embedded
system for access control and absence management Chapter 7 A new
perspective on E-health perforated blockchain: An intelligent healthcare
revolution using trigger-based supervised classification Chapter 8 Machine
learning for security boosting in Internet of Things environments Chapter 9
Combined machine learning for anomaly detection in IoT aggregator Rpi
Chapter 10 Efficient intrusion detection with XGBoost and feature selection
Chapter 11 A monitoring system with deep learning for IoT smart
dnvironments security Chapter 12 An intrusion detection system using
paragraph vector-distributed memory approach Chapter 13 Advanced security
of blockchain authentication system using zero-knowledge protocol Chapter
14 Intelligent phishing URL Classification using CNN Chapter 15 The impact
of AI and automation on digital forensic investigations Chapter 16 The
impact of ChatGPT on cybersecurity: Balancing Benefits against Risks
Chapter 17 Design of an unpredictable secure PRNG using collaborative
linear feedback shift registers Chapter 18 Building trust with blockchain:
Exploring its diverse applications Chapter 19 ML-based detection of GPS
jamming attacks on un-manned aerial vehicles Chapter 20 A comparative
analysis of random forest and isolation forest intrusion detection systems
Chapter 21 A collaborative anomaly detection model using QRNN and
blockchain Chapter 22 Iterated greedy with tabu search solving flow shop
scheduling problem
systems with machine learning Chapter 2 Scalable IoT anomaly detection:
Federated and split learning Chapter 3 Machine learning-based detection in
wireless sensor networks Chapter 4 A secure approach for next-generation
IoT networks: A comparative analysis Chapter 5 Efficient ECC-based RFID
authentication for enhanced IoT security Chapter 6 An AI-based embedded
system for access control and absence management Chapter 7 A new
perspective on E-health perforated blockchain: An intelligent healthcare
revolution using trigger-based supervised classification Chapter 8 Machine
learning for security boosting in Internet of Things environments Chapter 9
Combined machine learning for anomaly detection in IoT aggregator Rpi
Chapter 10 Efficient intrusion detection with XGBoost and feature selection
Chapter 11 A monitoring system with deep learning for IoT smart
dnvironments security Chapter 12 An intrusion detection system using
paragraph vector-distributed memory approach Chapter 13 Advanced security
of blockchain authentication system using zero-knowledge protocol Chapter
14 Intelligent phishing URL Classification using CNN Chapter 15 The impact
of AI and automation on digital forensic investigations Chapter 16 The
impact of ChatGPT on cybersecurity: Balancing Benefits against Risks
Chapter 17 Design of an unpredictable secure PRNG using collaborative
linear feedback shift registers Chapter 18 Building trust with blockchain:
Exploring its diverse applications Chapter 19 ML-based detection of GPS
jamming attacks on un-manned aerial vehicles Chapter 20 A comparative
analysis of random forest and isolation forest intrusion detection systems
Chapter 21 A collaborative anomaly detection model using QRNN and
blockchain Chapter 22 Iterated greedy with tabu search solving flow shop
scheduling problem
Chapter 1 Strengthening IIoT security: Integrating intrusion detection
systems with machine learning Chapter 2 Scalable IoT anomaly detection:
Federated and split learning Chapter 3 Machine learning-based detection in
wireless sensor networks Chapter 4 A secure approach for next-generation
IoT networks: A comparative analysis Chapter 5 Efficient ECC-based RFID
authentication for enhanced IoT security Chapter 6 An AI-based embedded
system for access control and absence management Chapter 7 A new
perspective on E-health perforated blockchain: An intelligent healthcare
revolution using trigger-based supervised classification Chapter 8 Machine
learning for security boosting in Internet of Things environments Chapter 9
Combined machine learning for anomaly detection in IoT aggregator Rpi
Chapter 10 Efficient intrusion detection with XGBoost and feature selection
Chapter 11 A monitoring system with deep learning for IoT smart
dnvironments security Chapter 12 An intrusion detection system using
paragraph vector-distributed memory approach Chapter 13 Advanced security
of blockchain authentication system using zero-knowledge protocol Chapter
14 Intelligent phishing URL Classification using CNN Chapter 15 The impact
of AI and automation on digital forensic investigations Chapter 16 The
impact of ChatGPT on cybersecurity: Balancing Benefits against Risks
Chapter 17 Design of an unpredictable secure PRNG using collaborative
linear feedback shift registers Chapter 18 Building trust with blockchain:
Exploring its diverse applications Chapter 19 ML-based detection of GPS
jamming attacks on un-manned aerial vehicles Chapter 20 A comparative
analysis of random forest and isolation forest intrusion detection systems
Chapter 21 A collaborative anomaly detection model using QRNN and
blockchain Chapter 22 Iterated greedy with tabu search solving flow shop
scheduling problem
systems with machine learning Chapter 2 Scalable IoT anomaly detection:
Federated and split learning Chapter 3 Machine learning-based detection in
wireless sensor networks Chapter 4 A secure approach for next-generation
IoT networks: A comparative analysis Chapter 5 Efficient ECC-based RFID
authentication for enhanced IoT security Chapter 6 An AI-based embedded
system for access control and absence management Chapter 7 A new
perspective on E-health perforated blockchain: An intelligent healthcare
revolution using trigger-based supervised classification Chapter 8 Machine
learning for security boosting in Internet of Things environments Chapter 9
Combined machine learning for anomaly detection in IoT aggregator Rpi
Chapter 10 Efficient intrusion detection with XGBoost and feature selection
Chapter 11 A monitoring system with deep learning for IoT smart
dnvironments security Chapter 12 An intrusion detection system using
paragraph vector-distributed memory approach Chapter 13 Advanced security
of blockchain authentication system using zero-knowledge protocol Chapter
14 Intelligent phishing URL Classification using CNN Chapter 15 The impact
of AI and automation on digital forensic investigations Chapter 16 The
impact of ChatGPT on cybersecurity: Balancing Benefits against Risks
Chapter 17 Design of an unpredictable secure PRNG using collaborative
linear feedback shift registers Chapter 18 Building trust with blockchain:
Exploring its diverse applications Chapter 19 ML-based detection of GPS
jamming attacks on un-manned aerial vehicles Chapter 20 A comparative
analysis of random forest and isolation forest intrusion detection systems
Chapter 21 A collaborative anomaly detection model using QRNN and
blockchain Chapter 22 Iterated greedy with tabu search solving flow shop
scheduling problem