This book provides a comprehensive analysis of security and privacy in cyber-physical systems, covering threat detection, cryptographic mechanisms, machine learning-based intrusion detection, and blockchain security.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Agbotiname Lucky Imoize is a Lecturer in the Department of Electrical and Electronics Engineering at the University of Lagos, Nigeria. His research interests include 6G wireless communications, wireless security systems, holographic metasurfaces, and artificial intelligence. He is a Fulbright fellow, the vice chair of the IEEE Communication Society Nigeria chapter, and a registered engineer with the Council for the Regulation of Engineering in Nigeria. He is a senior member of IEEE.
Webert Montlouis is a Chief Scientist at Johns Hopkins University, where he shares his time between the Applied Physics Laboratory (APL) and the Electrical and Computer Engineering department. He received his Ph.D. degree in electrical engineering from Northeastern University, Boston, MA, USA. His research interests are Communications, Adaptive Signal Processing, Robust Tracking and Localization, Algorithm Development, System-On-Chip implementation of DSP algorithms, Networking, and Antenna Array Signal Processing. He is a Fellow of IEEE, AAIA, and AIIA.
Segun I. Popoola is a senior lecturer at the School of Computing and Information Science at Anglia Ruskin University, United Kingdom. He received a Ph.D. degree in cyber security and artificial intelligence from the Department of Engineering, Faculty of Science and Engineering, Manchester Metropolitan University, Manchester, U.K., in 2022. In June 2022, The Royal Society, United Kingdom endorsed him as a Global Exceptional Talent. His research interests include wireless communications, deep learning, federated learning, cyber security, the Internet of Things, and smart critical infrastructure.
Mohammad Hammoudeh received a B.Sc. degree in computer communications from Arts Sciences and Technology University in 2004, an M.Sc. degree in advanced distributed systems from the University of Leicester in 2006, and a Ph.D. degree in computer science from the University of Wolverhampton in 2008. He is the Saudi Aramco Chair Professor of Cyber Security with the King Fahd University of Petroleum and Minerals. His research interests include the applications of zero trust security to internet-connected critical national infrastructures, blockchains, and other complex and highly decentralized systems.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26404474875
Quantité disponible : 1 disponible(s)
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
Hardcover. Etat : new. Hardcover. This book examines vulnerability threats and attack detection and mitigation, including the associated legal requirements, regulatory frameworks, and policies for enabling the security and privacy of cyber-physical systems. It provides researchers, academics, and practitioners with new insights into the real-world scenarios of deploying, applying, and managing security and privacy frameworks in modern cyber-physical systems.It addresses critical security and privacy concerns, including theoretical analysis, novel system architecture design and implementation, vulnerability discovery, analysis, mitigation, emerging application scenarios, experimental frameworks, and social and ethical dilemmas affecting all parties in cyber-physical systems. The book is an ideal reference for practitioners and researchers in cyber-physical systems, security and privacy, the Internet of Things, advanced cryptography, cyber defensive walls, industrial systems, and cyber threats. It is also a suitable textbook for graduate and senior undergraduate courses in these subjects. This book provides a comprehensive analysis of security and privacy in cyber-physical systems, covering threat detection, cryptographic mechanisms, machine learning-based intrusion detection, and blockchain security. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9788743801290
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 50555222-n
Quantité disponible : 10 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. N° de réf. du vendeur 409760804
Quantité disponible : 1 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. N° de réf. du vendeur 18404474865
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 50555222
Quantité disponible : 10 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 50555222-n
Quantité disponible : 10 disponible(s)
Vendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9788743801290
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 50555222
Quantité disponible : 10 disponible(s)
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
HRD. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur L2-9788743801290
Quantité disponible : Plus de 20 disponibles