It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-031.mrc:1117478:11849
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-031.mrc:1117478:11849?format=raw

LEADER: 11849cam a2200781 i 4500
001 15000502
005 20220403002309.0
006 m o d
007 cr cnu---unuuu
008 200201s2020 flu ob 001 0 eng d
035 $a(OCoLC)on1138501412
035 $a(NNC)15000502
040 $aYDX$beng$erda$epn$cYDX$dUKMGB$dOCLCO$dTYFRS$dN$T$dOCLCF$dYDXIT$dUKAHL$dEBLCP$dCNCGM$dBWN$dOCLCO$dOCLCQ$dOCLCO
015 $aGBC009537$2bnb
016 7 $a019682985$2Uk
019 $a1138678199$a1145373171$a1145382698$a1165794980$a1183814387
020 $a9781000766080$q(electronic book)
020 $a100076608X$q(electronic book)
020 $a9781000765847$q(electronic book)
020 $a1000765849$q(electronic book)
020 $a9781000765960$q(electronic book)
020 $a1000765962$q(electronic book)
020 $a9781003010463$q(electronic book)
020 $a1003010466$q(electronic book)
020 $z036744092X
020 $z9780367440923
024 7 $a10.1201/9781003010463$2doi
035 $a(OCoLC)1138501412$z(OCoLC)1138678199$z(OCoLC)1145373171$z(OCoLC)1145382698$z(OCoLC)1165794980$z(OCoLC)1183814387
037 $a9781000766080$bIngram Content Group
037 $a9781003010463$bTaylor & Francis
050 4 $aTK5105.8857$b.S43 2020
072 7 $aCOM$x032000$2bisacsh
072 7 $aCOM$x043000$2bisacsh
072 7 $aCOM$x053000$2bisacsh
072 7 $aUB$2bicssc
082 04 $a005.8$223
049 $aZCUA
245 00 $aSecurity analytics for the internet of everything /$cedited by Mohuiddin Ahmed, Abu S.S.M. Barkat Ullah, and Al-Sakib Khan Pathan.
264 1 $aBoca Raton, FL :$bCRC Press,$c[2020]
300 $a1 online resource
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
504 $aIncludes bibliographical references and index.
520 $aSecurity Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included. The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.
545 0 $aMohiuddin Ahmed attained his PhD in Computer Science from the University of New South Wales (UNSWAustralia). He has made practical and theoretical contributions in big data analytics (summarization) for a number of application domains and his research has a high impact on data analytics, critical infrastructure protection (IoT, smart grids), information security against DoS attacks, false data injection attacks, etc., and digital health. He is currently working as a Lecturer in Computing and Security Sciences in the School of Science at Edith Cowan University (ECU), Australia. Prior to joining ECU, he served as a Lecturer in the Centre for Cyber Security and Games at Canberra Institute of Technology (CIT) and was also involved with CIT's Data Strategy Working Group. He is currently exploring blockchain for ensuring security of healthcare devices, securing the prestigious ECU Early Career Researcher Grant. Mohiuddin has led edited books on Data Analytics, Cyber Security and Blockchain. Previously, he has worked in the areas of text mining and predictive analytics in the artificial intelligence division at MIMOS, Malaysia. Currently, Mohiuddin is an editorial advisory board member of Cambridge Scholars Publishing Group in the UK and Associate Editor of the International Journal of Computers and Applications (Taylor & Francis Group). Abu Saleh Shah Mohammad Barkat Ullah is working as Head of Centre for Cyber Security and Games at Canberra Institute of Technology. He attained his PhD from UNSW Australia with significant contribution in the areas of computational intelligence, genetic computing and optimization. He is currently principal investigator of a healthcare cyber security research project. He has published in reputed venues of computer science and actively involved in both academia and industry. Abu Barkat holds a Bachelor of Science Degree in Computer Science with outstanding results and achieved Gold Medal for such performance. He is also one of the pioneers in introducing False Data Injection Attacks in Healthcare domain. Al-Sakib Khan Pathan received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B. Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. He is currently an Associate Professor at the Computer Science and Engineering (CSE) department, Southeast University, Bangladesh. Previously, he was with the Computer Science department at IIUM, Malaysia during 2010-2015 and with the CSE department at BRAC Ufniversity, Bangladesh during 2009-2010. He also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009 where he completed his MS leading to PhD. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some Multidisciplinary issues. He is a recipient of several awards/best paper awards and has several notable publications in these areas. He has served as a Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous international conferences/workshops including the top tier and prestigious events like INFOCOM, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, etc. He was awarded the IEEE Outstanding Leadership Award and Certificate of Appreciation for his role in IEEE GreenCom'13 conference. He is currently serving on various editorial positions like Series Editor of ICT Book series by CRC Press, Taylor & Francis, Deputy Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, Associate Technical Editor of IEEE Communications Magazine, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, and International Journal of Sensor Networks, Inderscience Publishers, Associate Editor of International Journal of Computational Science and Engineering, Inderscience, Area Editor of International Journal of Communication Networks and Information Security, Guest Editor of many special issues of top ranked journals, and Editor/Author of 15 published books. One of his books has been included twice in the Intel Corporation's Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, 2 other books were indexed with all the titles (chapters) in Elsevier's acclaimed abstract and citation database, Scopus, in February 2015 and a seventh book is translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper were included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of many prestigious journals. He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT three times, in 2012, 2014, and 2015; Outstanding Reviewer of Elsevier Computer Networks (July 2015) and Elsevier JNCA (November 2015), just to mention a few. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.
588 0 $aOnline resource; title from digital title page (viewed on March 23, 2020).
505 0 $aCover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgments -- Editors -- Contributors -- Section I: Emerging Security Trends -- 1 Critical Analysis of Blockchain For Internet of Everything -- 1.1 Introduction -- 1.1.1 Chapter Roadmap -- 1.2 Overview of IoT -- 1.2.1 Key Features of IoT -- 1.2.2 Layered Architecture of IoT -- 1.2.3 Difference between the Traditional Networks and IoT -- 1.2.4 Issues in Centralized IoT Model -- 1.3 Blockchain in IoT: Future of the Digital World -- 1.3.1 Blockchain-Based IoT Architecture
505 8 $a1.3.1.1 IoT Gateway-Blockchain -- 1.3.1.2 IoT-IoT -- 1.3.1.3 IoT-Blockchain -- 1.3.1.4 Hybrid -- 1.3.2 Security Issues -- 1.3.2.1 Security Issues in Centralized IoT Model -- 1.3.2.2 Potential Blockchain Solutions from Literature -- 1.3.3 Establishing Security and Privacy through Blockchain: A Case Study of Smart Home -- 1.4 Summary on Blockchain-IoT Integration -- 1.4.1 Challenges and Opportunities -- 1.4.1.1 Storage Capacity and Scalability -- 1.4.1.2 Security -- 1.4.1.3 Privacy -- 1.4.1.4 Consensus Protocol -- 1.4.1.5 Smart Contracts -- 1.4.1.6 Legal Issues -- 1.5 Chapter Summary -- References
505 8 $a2 Iot Blockchain Integration: A Security Perspective -- 2.1 Introduction -- 2.2 Chapter Roadmap -- 2.3 Emerging Trends In Iot -- 2.3.1 Edge And Fog Computing -- 2.3.2 Low-Power Wide Area Networks -- 2.3.3 5G Networks -- 2.3.4 Machine Learning And Artificial Intelligence -- 2.4 Blockchain Concepts -- 2.4.1 Digital Signatures and Public-Key Cryptography -- 2.4.2 Blockchain Fundamentals -- 2.4.3 Directed Acylic Graph (Dag) -- 2.4.4 Consensus Algorithms -- 2.4.5 Zero-Knowledge Proofs -- 2.4.6 Confidential Transactions And Ring Signatures -- 2.4.7 Distributed Filesystems
505 8 $a2.4.8 Distributed Applications (Dapps) -- 2.5 Iot-Blockchain Promises -- 2.5.1 Blockchain Security Mechanisms -- 2.5.2 Security And Privacy Enhancing Use-Cases -- 2.6 Iot-Blockchain Integration -- 2.7 Iot-Blockchain Evaluation -- 2.7.1 Standardized Data Storage -- 2.7.2 Decentralized Data Marketplace -- 2.7.3 Attack Profile Vault -- 2.8 Conclusion -- Acknowledgement -- References -- 3 An Overview of The Dark Web -- 3.1 Introduction -- 3.1.1 What Is the Dark Web? -- 3.1.2 How Is the Dark Web Used? -- 3.1.3 Where Is the Dark Web Used? -- 3.1.4 Why Is It Important for Security?
505 8 $a3.2 Taxonomy of the Web -- 3.2.1 Clear Net or the Surface Web -- 3.2.2 Deep Web -- 3.2.3 Dark Web -- 3.3 Governance of the Dark Web -- 3.4 Future of the Dark Web -- 3.5 Conclusions -- References -- Section II: Cyber Governance -- 4 Cyber Security in The Public Sector: Awareness of Potential Risks Among Public Policy Executives -- 4.1 Introduction -- 4.2 Statement of the Problem -- 4.3 Significance and Scope of the Case Study -- 4.4 Review of the Literature -- 4.5 Method of Study -- 4.6 Cyber Security-Issues & Challenges -- 4.6.1 What is Cyber Security? -- 4.6.2 People, Processes, and Technology
650 0 $aInternet of things$xSecurity measures.
650 0 $aComputer security.
650 2 $aComputer Security
650 6 $aInternet des objets$xSécurité$xMesures.
650 6 $aSécurité informatique.
650 7 $aCOMPUTERS$xInformation Technology.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xGeneral.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
655 4 $aElectronic books.
700 1 $aAhmed, Mohiuddin$c(Computer scientist),$eeditor.
700 1 $aAbu Barkat, Abu,$eeditor.
700 1 $aPathan, Al-Sakib Khan,$eeditor.
776 08 $iPrint version:$z036744092X$z9780367440923$w(OCoLC)1120148762
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15000502$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS