LEADER 04509nam 22006495 450 001 9910767586503321 005 20240321193006.0 010 $a3-031-45162-7 024 7 $a10.1007/978-3-031-45162-1 035 $a(MiAaPQ)EBC30980151 035 $a(Au-PeEL)EBL30980151 035 $a(CKB)29128108900041 035 $a(DE-He213)978-3-031-45162-1 035 $a(EXLCZ)9929128108900041 100 $a20231130d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity Vigilance and Security Engineering of Internet of Everything /$fedited by Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (229 pages) 225 1 $aInternet of Things, Technology, Communications and Computing,$x2199-1081 311 08$aPrint version: Naseer Qureshi, Kashif Cybersecurity Vigilance and Security Engineering of Internet of Everything Cham : Springer,c2024 9783031451614 327 $aIntroduction -- Part A: Security Threats and Vulnerabilities -- Internet of Everything: Evolution and fundamental concepts -- Cybersecurity Threats and Attacks in IoE Networks -- Attacks Detection Mechanism for IoE Networks -- Cyber Resilience, Principles, and Practices -- Future Cybersecurity Challenges for IoE Networks -- Part B: Security Vigilance and Security Engineering for IoE Networks -- Networking and Security Architectures for IoE Networks -- Machine Learning-Based Detection and Prevention Systems for IoE -- Role of Blockchain Models for IoE Infrastructures and Applications -- Cybersecurity as a Service -- Big data Analytics for Cybersecurity in IoE Networks -- Cybersecurity Standards and Policies for CPS in IoE -- Future Privacy, and Trust Challenges for IoE Networks -- Conclusion. 330 $aThis book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms. Discusses cyber security threats and vulnerabilities, security vigilance, and security engineering for IoE networks; Provides prevention techniques like intrusion detection, trust evaluation, crypto, and hashing privacy solutions; Features tips to secure networks from security attacks like repudiation, tampering, spoofing, and elevation of privilege. 410 0$aInternet of Things, Technology, Communications and Computing,$x2199-1081 606 $aTelecommunication 606 $aCooperating objects (Computer systems) 606 $aInternet of things 606 $aSecurity systems 606 $aCommunications Engineering, Networks 606 $aCyber-Physical Systems 606 $aInternet of Things 606 $aSecurity Science and Technology 615 0$aTelecommunication. 615 0$aCooperating objects (Computer systems) 615 0$aInternet of things. 615 0$aSecurity systems. 615 14$aCommunications Engineering, Networks. 615 24$aCyber-Physical Systems. 615 24$aInternet of Things. 615 24$aSecurity Science and Technology. 676 $a621.382 700 $aNaseer Qureshi$b Kashif$01453265 701 $aNewe$b Thomas$01453266 701 $aJeon$b Gwanggil$01279103 701 $aChehri$b Abdellah$01453267 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910767586503321 996 $aCybersecurity Vigilance and Security Engineering of Internet of Everything$93655855 997 $aUNINA