
Security Framework for The Internet of Things Applications
- 152 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Security Framework for The Internet of Things Applications
About this book
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges. It further covers three security aspects including Internet of Things device identification and authentication, network traffic intrusion detection, and executable malware files detection.
This book:
- Presents a security framework model design named Behavioral Network Traffic Identification and Novelty Anomaly Detection for the IoT Infrastructures
- Highlights recent advancements in machine learning, deep learning, and networking standards to boost Internet of Things security
- Builds a near real-time solution for identifying Internet of Things devices connecting to a network using their network traffic traces and providing them with sufficient access privileges
- Develops a robust framework for detecting IoT anomalous network traffic
- Covers an anti-malware solution for detecting malware targeting embedded devices
It will serve as an ideal text for senior undergraduate and graduate students, and professionals in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Table of contents
- Cover Page
- Half-Title Page
- Series Page
- Title Page
- Copyright Page
- Dedication Page
- Contents
- List of Figures
- List of Tables
- Preface
- Author
- Chapter 1 Introduction
- Chapter 2 Background and the State-of-the-Art Security Solutions
- Chapter 3 IoT Device Identification
- Chapter 4 Behavioral Novelty Detection for IoT Network Traffic
- Chapter 5 Detection of Malware Targeting Embedded Devices
- Chapter 6 Conclusion and Future Directions
- References
- Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app