000 05190nam a22006255i 4500
001 978-3-031-47590-0
003 DE-He213
005 20250516155958.0
007 cr nn 008mamaa
008 240221s2024 sz | s |||| 0|eng d
020 _a9783031475900
_9978-3-031-47590-0
050 4 _aQA76.9.A25
050 4 _aJC596-596.2
072 7 _aURD
_2bicssc
072 7 _aCOM060040
_2bisacsh
072 7 _aURD
_2thema
082 0 4 _a005.8
_223
082 0 4 _a323.448
_223
245 1 0 _aDecision Making and Security Risk Management for IoT Environments
_h[electronic resource] /
_cedited by Wadii Boulila, Jawad Ahmad, Anis Koubaa, Maha Driss, Imed Riadh Farah.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2024.
300 _aVIII, 229 p. 115 illus., 85 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x2512-2193 ;
_v106
505 0 _aInternet of Things Overview: Architecture, Technologies, Application, and Challenges -- IoMT Applications Perspectives: from Opportunities and Security Challenges to Cyber-Risk Management -- Cybersecurity Challenges and Implications for the Adoption of Cloud Computing and IoT: DDoS Attacks as an Example -- Implementation of the C4.5 Algorithm in the Internet of Things Applications -- Intrusion Detection Systems using Machine Learning -- Multivariate Procedure for Modeling and Prediction of Temperature in Punjab, Pakistan -- New Proposed Model for the Influence of Climate Change on the Tension Anticipation in Hospital Emergencies -- Statistical Downscaling Modeling for Temperature Prediction -- UAV-based IoT applications for action recognition -- Federated Learning for Market Surveillance -- Fake News in Social Media: Fake News Themes and Intentional Deception in the News and on Social Media.
520 _aThis book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The authors provide a variety of subjects related to the following Keywords: IoT, security, AI, deep learning, federated learning, intrusion detection systems, and distributed computing paradigms. This book also offers a collection of the most up-to-date research, providing a complete overview of security and privacy-preserving in IoT environments. It introduces new approaches based on machine learning that tackles security challenges and provides the field with new research material that's not covered in the primary literature. The Internet of Things (IoT) refers to a network of tiny devices linked to the Internet or other communication networks. IoT is gaining popularity, because it opens up new possibilities for developing many modern applications. This would include smart cities, smart agriculture, innovativehealthcare services and more. The worldwide IoT market surpassed $100 billion in sales for the first time in 2017, and forecasts show that this number might reach $1.6 trillion by 2025. However, as IoT devices grow more widespread, threats, privacy and security concerns are growing. The massive volume of data exchanged highlights significant challenges to preserving individual privacy and securing shared data. Therefore, securing the IoT environment becomes difficult for research and industry stakeholders. Researchers, graduate students and educators in the fields of computer science, cybersecurity, distributed systems and artificial intelligence will want to purchase this book. It will also be a valuable companion for users and developers interested in decision-making and security risk management in IoT environments.
541 _fUABC ;
_cPerpetuidad
650 0 _aData protection
_xLaw and legislation.
650 0 _aMachine learning.
650 0 _aCooperating objects (Computer systems).
650 1 4 _aPrivacy.
650 2 4 _aMachine Learning.
650 2 4 _aCyber-Physical Systems.
700 1 _aBoulila, Wadii.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aAhmad, Jawad.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKoubaa, Anis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDriss, Maha.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aFarah, Imed Riadh.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031475894
776 0 8 _iPrinted edition:
_z9783031475917
776 0 8 _iPrinted edition:
_z9783031475924
830 0 _aAdvances in Information Security,
_x2512-2193 ;
_v106
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-47590-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c274233
_d274232