Security Framework and Defense Mechanisms for IoT Reactive Jamming Attacks (Registro nro. 275915)

MARC details
000 -LIDER
fixed length control field 04538nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-3-031-65929-4
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250516160115.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240802s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031659294
-- 978-3-031-65929-4
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TH9701-9745
072 #7 - SUBJECT CATEGORY CODE
Subject category code TNKS
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code SCI055000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code TNKS
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Alaba, Fadele Ayotunde.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Security Framework and Defense Mechanisms for IoT Reactive Jamming Attacks
Medium [electronic resource] /
Statement of responsibility, etc. by Fadele Ayotunde Alaba, Alvaro Rocha.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2024.
300 ## - PHYSICAL DESCRIPTION
Extent XVIII, 113 p. 43 illus., 31 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Studies in Systems, Decision and Control,
International Standard Serial Number 2198-4190 ;
Volume/sequential designation 548
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 2.Internet of Things -- 3.Embedded IoT Security Framework -- 4.Defense Mechanism for Reactive Jamming Attack in IoT Networks -- 5.Statistical Results Validation -- 6.Conclusions and Future Directions.
520 ## - SUMMARY, ETC.
Summary, etc. This book digs into the important confluence of cybersecurity and big data, providing insights into the ever-changing environment of cyber threats and solutions to protect these enormous databases. In the modern digital era, large amounts of data have evolved into the vital organs of businesses, providing the impetus for decision-making, creativity, and a competitive edge. Cyberattacks pose a persistent danger to this important resource since they can result in data breaches, financial losses, and harm to an organization's brand. Features of particular interest include: a. Understanding the Threat Landscape: The book gives a complete review of the many different types of cyber threats that target big data, including data breaches, ransomware attacks, and insider threats. b. Analysing Real-World Case Studies: The purpose of this section is to provide the reader with useful insights into the strategies, methods, and processes that cyber adversaries use via the in-depth examination of real-world assaults on big data. c. Strategies for Risk Mitigation: This book provides a comprehensive and actionable approach to reducing the dangers of cyberattacks on large amounts of data. It encompasses a broad variety of tactics, including network protection, encoding, and access restrictions d. Emerging Technologies: This section introduces readers to cutting-edge technologies and best practices for securing large data. e. Compliance with Regulations: The book examines the regulatory environment that governs data protection and privacy, including the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and industry-specific requirements. f. Trends of the Future: This book covers current trends and issues in cybersecurity and gives forward-looking views into the future of big data security. This is done in recognition that the cybersecurity environment is always shifting and developing. g. Contributors of Expertise: The book includes contributions from industry practitioners, data scientists, and cybersecurity specialists who have hands-on experience defending large data settings.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Owner UABC ;
Method of acquisition Perpetuidad
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Security systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Engineering mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Engineering
Subdivisión general Data processing.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Security Science and Technology.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Mathematical and Computational Engineering Applications.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data Engineering.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rocha, Alvaro.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031659287
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031659300
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031659317
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Studies in Systems, Decision and Control,
-- 2198-4190 ;
Volume number/sequential designation 548
856 40 - ELECTRONIC LOCATION AND ACCESS
Public note Libro electrónico
Uniform Resource Identifier http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-65929-4
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Date last seen Número de copia Tipo de material
  Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica 16/05/2025   16/05/2025 1 Libro Electrónico

Con tecnología Koha