Intelligent Security Management and Control in the IoT. Mohamed-Aymen Chalouf

Intelligent Security Management and Control in the IoT - Mohamed-Aymen Chalouf


Скачать книгу
packet generation rate and energy efficiency depending on th...Figure 6.10. Architecture of harvesting multisource energy for LoRa standard. Fo...Figure 6.11. Performance of different EMs over 7 days of execution. For a color ...

      7 Chapter 7Figure 7.1. XACML components and modules (XACML 2019)Figure 7.2. Integrating XACML and SAML (OASIS 2019c)Figure 7.3. Security architecture for the Internet of Things. For a color versio...Figure 7.4. IoT access control environment. For a color version of this figure, ...Figure 7.5. IoT-MAAC-MAAC access control architecture. For a color version of th...Figure 7.6. DPS notation system. For a color version of this figure, see www.ist...Figure 7.7. DSL notation system. For a color version of this figure, see www.ist...Figure 7.8. DOT notation system. For a color version of this figure, see www.ist...Figure 7.9. DPS, DSL and DOT membership functions. For a color version of this f...Figure 7.10. IoT-MAAC decision-making algorithm. For a color version of this fig...Figure 7.11. SAML assertion of the IoT object. For a color version of this figur...Figure 7.12. XACML authorization request from the LL-Gw in IoT-MAAC. For a color...Figure 7.13. XACML response from the HL-Gw in IoT-MAAC. For a color version of t...

      8 Chapter 8Figure 8.1. Biometric techniques (Cabra et al. 2018)Figure 8.2. The evolution of authentication methods from simple authentication t...Figure 8.3. Registration phase of Sammoud et al. (2020c). For a color version of...Figure 8.4. Login phase of Sammoud et al. (2020c). For a color version of this f...Figure 8.5. a) Authentication phase of Sammoud et al. (2020c); b) Protocol authe...Figure 8.6. An ECG sequence (Sammoud et al. 2020a). For a color version of this ...Figure 8.7. Overall structure of an authentication system based on ECGFigure 8.8. Acquiring an ECG signal. For a color version of this figure, see www...

      9 Chapter 9Figure 9.1. Blockchain architecture (Che et al. 2019). For a color version of th...Figure 9.2. a) Traditional intelligent identity and access management; b) Blockc...

      10 Chapter 10Figure 10.1. Lifecycle of a context. For a color version of this figure, see www...Figure 10.2. Example of implementing context-aware security (Sylla et al. 2021).Figure 10.3. CASPaaS architecture (Sylla et al. 2020). For a color version of th...

      11 Chapter 11Figure 11.1. Number of scientific publications per year with “Moving Target Defe...Figure 11.2. MTD taxonomies and network layers (with a reference to the section ...Figure 11.3. Components of the proposed MTD framework. For a color version of th...

      Guide

      1  Cover

      2  Table of Contents

      3  Title Page

      4  Copyright

      5  Begin Reading

      6  List of Authors

      7  Index

      8  End User License Agreement

      Pages

      1  v

      2  iii

      3  iv

      4  1

      5  2

      6  3

      7  4

      8  5

      9  6

      10  7

      11  8

      12  9

      13  10

      14  11

      15  12

      16  13

      17 14

      18  15

      19  16

      20  17

      21  18

      22  19

      23  20

      24  21

      25  22

      26  23

      27  24

      28  25

      29  27

      30  28

      31  29

      32  30

      33  31

      34  32

      35  33

      36  34

      37 


Скачать книгу