top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design [[electronic resource] /] / by Juntao Chen, Quanyan Zhu
A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design [[electronic resource] /] / by Juntao Chen, Quanyan Zhu
Autore Chen Juntao
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (111 pages)
Disciplina 004.6
Collana SpringerBriefs in Control, Automation and Robotics
Soggetto topico Electrical engineering
Game theory
Computer communication systems
Control engineering
Communications Engineering, Networks
Game Theory, Economics, Social and Behav. Sciences
Computer Communication Networks
Control and Systems Theory
ISBN 3-030-23444-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto I: Introduction -- II: Background of Game Theory and Network Science -- III: Meta-Network Modeling and Resilience Analysis -- IV: Interdependent Complex Networks -- V: Interdependent Critical Infrastructure Networks -- VI: Conclusions.
Record Nr. UNINA-9910366604703321
Chen Juntao  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Industrial Control Systems Security and Resiliency [[electronic resource] ] : Practice and Theory / / edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
Industrial Control Systems Security and Resiliency [[electronic resource] ] : Practice and Theory / / edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (277 pages)
Disciplina 658.478
Collana Advances in Information Security
Soggetto topico Data protection
Computer communication systems
Electrical engineering
Artificial intelligence
Security
Computer Communication Networks
Communications Engineering, Networks
Artificial Intelligence
ISBN 3-030-18214-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience.
Record Nr. UNINA-9910349285603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IoT supply chain security risk analysis and mitigation : modeling, computations, and software tools / / Timothy Kieras, Junaid Farooq and Quanyan Zhu
IoT supply chain security risk analysis and mitigation : modeling, computations, and software tools / / Timothy Kieras, Junaid Farooq and Quanyan Zhu
Autore Kieras Timothy
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (142 pages)
Disciplina 658.7
Collana SpringerBriefs in computer science
Soggetto topico Business logistics
Business logistics - Security measures
Internet of things - Security measures
ISBN 3-031-08480-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgments -- Contents -- Acronyms -- 1 IoT and Supply Chain Security -- 1.1 Vendor Landscape of IoT Systems -- 1.2 Brief Taxonomy of Supply Chain Security -- 1.3 IoT Supply Chain Risk: Hard to Observe and Hard to Control -- 1.3.1 Dissecting Supply Chain Links in IoT -- 1.4 IoT Risk Implications and Consequences -- 1.4.1 Key Features of IoT Security -- 1.5 Challenges in Cyber Supply Chain Risk Analysis of IoT -- 1.6 Supply Chain Resilience -- 1.6.1 Top-Down Approach to Managing Risk -- 1.6.2 Bottom-Up Approach to Managing Risk -- 1.7 Overview of the Book -- References -- 2 Risk Modeling and Analysis -- 2.1 Risk Scoring in Component Graphs -- 2.1.1 Introduction -- 2.1.2 Related Work -- 2.1.3 Contributions -- 2.2 System Model for Risk Assessment -- 2.2.1 Model Definitions -- 2.2.1.1 Component Security Graph -- 2.2.1.2 System Supplier Network -- 2.2.2 Supplier Trust -- 2.2.3 Systemic Risk Graph -- 2.3 Risk Analysis Metrics -- 2.3.1 Systemic Risk Function -- 2.3.2 Supplier Involvement Measure -- 2.4 Uncertainties in Model Development -- 2.4.1 Parametric Uncertainties in Probability Estimates -- 2.4.2 Structural Modeling Uncertainties -- 2.5 Uncertainty Case Studies -- 2.5.1 Case 0: Ground Truth -- 2.5.2 Case 1: Uncertainty of Single Node Logic -- 2.5.3 Case 2: Uncertainty of Node Omission -- 2.5.4 Case 3: Uncertainty in Edge Placement -- 2.5.5 Case 4: Uncertainty in Probability Values -- 2.6 Conclusion -- References -- 3 Risk Mitigation Decisions -- 3.1 Cost Effective Vendor Selection -- 3.1.1 Strict Supplier Choice Problem -- 3.2 Supply Chain Diversification -- 3.2.1 Component Security Risk Minimization Problem -- 3.2.2 Supplier Involvement Minimization Problem -- 3.2.3 Relaxed Supplier Choice Problem -- 3.3 Case Study and Results -- 3.3.1 Simulation Setup -- 3.3.2 Example Scenarios and Results.
3.3.3 Supplier Involvement Experiments -- 3.4 Conclusion -- References -- 4 Policy Management -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Accountability Models in IoT Supply Chain -- 4.3.1 Running Examples -- 4.3.2 System Modeling -- 4.3.3 Accountability Investigation -- 4.3.4 Model Extensions -- 4.3.4.1 Single Supplier with Multiple Types -- 4.3.4.2 Multiple Suppliers -- 4.4 Case Study 1: Autonomous Truck Platooning -- 4.4.1 Background -- 4.4.2 Vehicle Dynamics Model -- 4.4.3 Accountability Testing -- 4.4.4 Parameter Analysis -- 4.4.5 Investigation Performance -- 4.4.5.1 Accountability Receiver Operating Characteristic -- 4.4.5.2 Area Under the AROC Curve -- 4.5 Case Study 2: Ransomware in IoT Supply Chain -- 4.5.1 Background -- 4.5.2 Smart Lock and Ransomware Attack -- 4.5.3 Accountability Investigation -- 4.5.3.1 Tier-1 Investigation -- 4.5.3.2 Multi-Stage Accountability Investigation -- 4.6 Compliance and Cyber Insurance -- 4.6.1 Compliance Modeling -- 4.6.2 Contract Design -- 4.6.3 Cyber Insurance -- 4.6.3.1 Background Introduction -- 4.6.3.2 Insurance Policy Design -- 4.6.3.3 Maximum Premium with Full Coverage -- 4.6.3.4 Coverage Level with Given Premium -- 4.6.3.5 Trade-Off Between Accountability Investment and Cyber Insurance -- 4.7 Conclusion -- References -- 5 Computational Tools -- 5.1 Introduction to I-SCRAM: A Software Tool for IoT SCRM -- 5.1.1 Supply Chain Risk Analysis and Mitigation -- 5.1.1.1 I-SCRAM Software Components -- 5.1.1.2 User Interface -- 5.1.1.3 Data Model -- 5.1.1.4 Server -- 5.1.1.5 Implementation of Core Operations -- 5.2 Case Study 1: Autonomous Vehicle -- 5.3 Case Study 2: Industrial Control System -- 5.4 Conclusions and Outlooks -- References -- Index.
Record Nr. UNINA-9910592984403321
Kieras Timothy  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IoT supply chain security risk analysis and mitigation : modeling, computations, and software tools / / Timothy Kieras, Junaid Farooq and Quanyan Zhu
IoT supply chain security risk analysis and mitigation : modeling, computations, and software tools / / Timothy Kieras, Junaid Farooq and Quanyan Zhu
Autore Kieras Timothy
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (142 pages)
Disciplina 658.7
Collana SpringerBriefs in computer science
Soggetto topico Business logistics
Business logistics - Security measures
Internet of things - Security measures
ISBN 3-031-08480-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgments -- Contents -- Acronyms -- 1 IoT and Supply Chain Security -- 1.1 Vendor Landscape of IoT Systems -- 1.2 Brief Taxonomy of Supply Chain Security -- 1.3 IoT Supply Chain Risk: Hard to Observe and Hard to Control -- 1.3.1 Dissecting Supply Chain Links in IoT -- 1.4 IoT Risk Implications and Consequences -- 1.4.1 Key Features of IoT Security -- 1.5 Challenges in Cyber Supply Chain Risk Analysis of IoT -- 1.6 Supply Chain Resilience -- 1.6.1 Top-Down Approach to Managing Risk -- 1.6.2 Bottom-Up Approach to Managing Risk -- 1.7 Overview of the Book -- References -- 2 Risk Modeling and Analysis -- 2.1 Risk Scoring in Component Graphs -- 2.1.1 Introduction -- 2.1.2 Related Work -- 2.1.3 Contributions -- 2.2 System Model for Risk Assessment -- 2.2.1 Model Definitions -- 2.2.1.1 Component Security Graph -- 2.2.1.2 System Supplier Network -- 2.2.2 Supplier Trust -- 2.2.3 Systemic Risk Graph -- 2.3 Risk Analysis Metrics -- 2.3.1 Systemic Risk Function -- 2.3.2 Supplier Involvement Measure -- 2.4 Uncertainties in Model Development -- 2.4.1 Parametric Uncertainties in Probability Estimates -- 2.4.2 Structural Modeling Uncertainties -- 2.5 Uncertainty Case Studies -- 2.5.1 Case 0: Ground Truth -- 2.5.2 Case 1: Uncertainty of Single Node Logic -- 2.5.3 Case 2: Uncertainty of Node Omission -- 2.5.4 Case 3: Uncertainty in Edge Placement -- 2.5.5 Case 4: Uncertainty in Probability Values -- 2.6 Conclusion -- References -- 3 Risk Mitigation Decisions -- 3.1 Cost Effective Vendor Selection -- 3.1.1 Strict Supplier Choice Problem -- 3.2 Supply Chain Diversification -- 3.2.1 Component Security Risk Minimization Problem -- 3.2.2 Supplier Involvement Minimization Problem -- 3.2.3 Relaxed Supplier Choice Problem -- 3.3 Case Study and Results -- 3.3.1 Simulation Setup -- 3.3.2 Example Scenarios and Results.
3.3.3 Supplier Involvement Experiments -- 3.4 Conclusion -- References -- 4 Policy Management -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Accountability Models in IoT Supply Chain -- 4.3.1 Running Examples -- 4.3.2 System Modeling -- 4.3.3 Accountability Investigation -- 4.3.4 Model Extensions -- 4.3.4.1 Single Supplier with Multiple Types -- 4.3.4.2 Multiple Suppliers -- 4.4 Case Study 1: Autonomous Truck Platooning -- 4.4.1 Background -- 4.4.2 Vehicle Dynamics Model -- 4.4.3 Accountability Testing -- 4.4.4 Parameter Analysis -- 4.4.5 Investigation Performance -- 4.4.5.1 Accountability Receiver Operating Characteristic -- 4.4.5.2 Area Under the AROC Curve -- 4.5 Case Study 2: Ransomware in IoT Supply Chain -- 4.5.1 Background -- 4.5.2 Smart Lock and Ransomware Attack -- 4.5.3 Accountability Investigation -- 4.5.3.1 Tier-1 Investigation -- 4.5.3.2 Multi-Stage Accountability Investigation -- 4.6 Compliance and Cyber Insurance -- 4.6.1 Compliance Modeling -- 4.6.2 Contract Design -- 4.6.3 Cyber Insurance -- 4.6.3.1 Background Introduction -- 4.6.3.2 Insurance Policy Design -- 4.6.3.3 Maximum Premium with Full Coverage -- 4.6.3.4 Coverage Level with Given Premium -- 4.6.3.5 Trade-Off Between Accountability Investment and Cyber Insurance -- 4.7 Conclusion -- References -- 5 Computational Tools -- 5.1 Introduction to I-SCRAM: A Software Tool for IoT SCRM -- 5.1.1 Supply Chain Risk Analysis and Mitigation -- 5.1.1.1 I-SCRAM Software Components -- 5.1.1.2 User Interface -- 5.1.1.3 Data Model -- 5.1.1.4 Server -- 5.1.1.5 Implementation of Core Operations -- 5.2 Case Study 1: Autonomous Vehicle -- 5.3 Case Study 2: Industrial Control System -- 5.4 Conclusions and Outlooks -- References -- Index.
Record Nr. UNISA-996490366203316
Kieras Timothy  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network Games, Control, and Optimization [[electronic resource] ] : Proceedings of NETGCOOP 2018, New York, NY / / edited by Jean Walrand, Quanyan Zhu, Yezekael Hayel, Tania Jimenez
Network Games, Control, and Optimization [[electronic resource] ] : Proceedings of NETGCOOP 2018, New York, NY / / edited by Jean Walrand, Quanyan Zhu, Yezekael Hayel, Tania Jimenez
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2019
Descrizione fisica 1 online resource (293 pages)
Disciplina 519.3
Collana Static & Dynamic Game Theory: Foundations & Applications
Soggetto topico Game theory
System theory
Computer science—Mathematics
Computer mathematics
Game Theory, Economics, Social and Behav. Sciences
Systems Theory, Control
Mathematical Applications in Computer Science
Math Applications in Computer Science
ISBN 3-030-10880-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pricing of Coexisting Cellular and Community Networks -- Achieving Arbitrary Throughput-Fairness Trade-offs in the Inter Cell Interference Coordination with Fixed Transmit Power Problem -- Coexistence of LTE-Unlicensed and WiFi with Optimal Channel Aggregation -- Analysis of Sponsored Data Practices in the Case of Competing Wireless Service Providers -- Media delivery competition with edge cloud, remote cloud and networking -- An Algorithmic Framework for Geo-Distributed Analytics -- The Stackelberg Equilibria of the Kelly Mechanism -- To Participate or Not in a Coalition in Adversarial Games -- On the Asymptotic Content Routing Stretch in Network of Caches: Impact of Popularity Learning -- Tiered Spectrum Measurement Markets for Licensed Secondary Spectrum -- On Incremental Passivity in Network Games -- Impact of social connectivity on herding behavior -- A truthful auction mechanism for dynamic allocation of LSA spectrum blocks for 5G -- Routing game with nonseparable costs for EV driving and charging incentive design -- The Social Medium Selection Game -- Public Good Provision Games on Networks with Resource Pooling.
Record Nr. UNINA-9910338249003321
Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Resource management for on-demand mission-critical internet of things applications / / Junaid Farooq, Quanyan Zhu
Resource management for on-demand mission-critical internet of things applications / / Junaid Farooq, Quanyan Zhu
Autore Farooq Junaid
Pubbl/distr/stampa Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2021]
Descrizione fisica 1 online resource (227 pages)
Disciplina 004.678
Collana IEEE Press Ser.
Soggetto topico Internet of things
Soggetto genere / forma Electronic books.
ISBN 1-119-71612-8
1-119-71611-X
1-119-71610-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Acronyms -- Part I Introduction -- Chapter 1 Internet of Things‐Enabled Systems and Infrastructure -- 1.1 Cyber-Physical Realm of IoT -- 1.2 IoT in Mission‐Critical Applications -- 1.3 Overview of the Book -- 1.3.1 Main Topics -- 1.3.1.1 Dynamic Reservation of Wireless Spectrum Resources -- 1.3.1.2 Dynamic Cross‐Layer Connectivity Using Aerial Networks -- 1.3.1.3 Dynamic Processes Over Multiplex Spatial Networks and Reconfigurable Design -- 1.3.1.4 Sequential Resource Allocation Under Spatio‐Temporal Uncertainties -- 1.3.2 Notations -- Chapter 2 Resource Management in IoT‐Enabled Interdependent Infrastructure -- 2.1 System Complexity and Scale -- 2.2 Network Geometry and Dynamics -- 2.3 On‐Demand MC‐IoT Services and Decision Avenues -- 2.4 Performance Metrics -- 2.5 Overview of Scientific Methodologies -- Part II Design Challenges in MC‐IoT -- Chapter 3 Wireless Connectivity Challenges -- 3.1 Spectrum Scarcity and Reservation Based Access -- 3.2 Connectivity in Remote Environments -- 3.3 IoT Networks in Adversarial Environments -- Chapter 4 Resource and Service Provisioning Challenges -- 4.1 Efficient Allocation of Cloud Computing Resources -- 4.2 Dynamic Pricing in the Cloud -- 4.3 Spatio‐Temporal Urban Service Provisioning -- Part III Wireless Connectivity Mechanisms for MC‐IoT -- Chapter 5 Reservation‐Based Spectrum Access Contracts -- 5.1 Reservation of Time-Frequency Blocks in the Spectrum -- 5.1.1 Network Model -- 5.1.2 Utility of Spectrum Reservation -- 5.2 Dynamic Contract Formulation -- 5.2.1 Objective of Network Operator -- 5.2.2 Spectrum Reservation Contract -- 5.2.2.1 Operator Profitability -- 5.2.2.2 IC and IR Constraints -- 5.2.3 Optimal Contracting Problem -- 5.2.4 Solution to the Optimization Problem -- 5.3 Mission‐Oriented Pricing and Refund Policies.
5.4 Summary and Conclusion -- Chapter 6 Resilient Connectivity of IoT Using Aerial Networks -- 6.1 Connectivity in the Absence of Backhaul Networks -- 6.2 Aerial Base Station Modeling -- 6.3 Dynamic Coverage and Connectivity Mechanism -- 6.3.1 MAP-MSD Matching -- 6.3.2 MAP Dynamics and Objective -- 6.3.3 Controller Design -- 6.3.3.1 Attractive and Repulsive Function -- 6.3.3.2 Velocity Consensus Function -- 6.3.4 Individual Goal Function -- 6.3.5 Cluster Centers -- 6.4 Performance Evaluation and Simulation Results -- 6.4.1 Results and Discussion -- 6.4.1.1 Simulation Parameters -- 6.4.1.2 Resilience -- 6.4.1.3 Comparison -- 6.5 Summary and Conclusion -- Part IV Secure Network Design Mechanisms -- Chapter 7 Wireless IoT Network Design in Adversarial Environments -- 7.1 Adversarial Network Scenarios -- 7.2 Modeling Device Capabilities and Network Heterogeneity -- 7.2.1 Network Geometry -- 7.2.2 Network Connectivity -- 7.2.2.1 Intra‐layer Connectivity -- 7.2.2.2 Network‐wide Connectivity -- 7.3 Information Dissemination Under Attacks -- 7.3.1 Information Dynamics -- 7.3.1.1 Single Message Propagation -- 7.3.1.2 Multiple Message Propagation -- 7.3.2 Steady State Analysis -- 7.4 Mission‐Specific Network Optimization -- 7.4.1 Equilibrium Solution -- 7.4.2 Secure and Reconfigurable Network Design -- 7.5 Simulation Results and Validation -- 7.5.1 Mission Scenarios -- 7.5.1.1 Intelligence -- 7.5.1.2 Encounter Battle -- 7.6 Summary and Conclusion -- Chapter 8 Network Defense Mechanisms Against Malware Infiltration -- 8.1 Malware Infiltration and Botnets -- 8.1.1 Network Model -- 8.1.2 Threat Model -- 8.2 Propagation Modeling and Analysis -- 8.2.1 Modeling of Malware and Information Evolution -- 8.2.2 State Space Representation and Dynamics -- 8.2.3 Analysis of Equilibrium State -- 8.3 Patching Mechanism for Network Defense -- 8.3.1 Simulation Results.
8.3.2 Simulation and Validation -- 8.4 Summary and Conclusion -- Part V Resource Provisioning Mechanisms -- Chapter 9 Revenue Maximizing Cloud Resource Allocation -- 9.1 Cloud Service Provider Resource Allocation Problem -- 9.2 Allocation and Pricing Rule -- 9.3 Dynamic Revenue Maximization -- 9.3.1 Adaptive and Resilient Allocation and Pricing Policy -- 9.4 Numerical Results and Discussions -- 9.5 Summary and Conclusion -- Chapter 10 Dynamic Pricing of Fog‐Enabled MC‐IoT Applications -- 10.1 Edge Computing and Delay Modeling -- 10.2 Allocation Efficiency and Quality of Experience -- 10.2.1 Allocation Policy -- 10.2.2 Pricing Policy -- 10.3 Optimal Allocation and Pricing Rules -- 10.3.1 Single VMI Case -- 10.3.2 Multiple VMI Case -- 10.3.3 Expected Revenue -- 10.3.4 Implementation of Dynamic VMI Allocation and Pricing -- 10.4 Numerical Experiments and Discussion -- 10.4.1 Experiment Setup -- 10.4.2 Simulation Results -- 10.4.3 Comparison with Other Approaches -- 10.5 Summary and Conclusion -- Chapter 11 Resource Provisioning to Spatio‐Temporal Urban Services -- 11.1 Spatio‐Temporal Modeling of Urban Service Requests -- 11.1.1 Characterization of Service Requests -- 11.1.2 Utility of Resource Allocation -- 11.1.3 Problem Definition -- 11.2 Optimal Dynamic Allocation Mechanism -- 11.2.1 Dynamic Programming Solution -- 11.2.2 Computation and Implementation -- 11.3 Numerical Results and Discussion -- 11.3.1 Special Cases -- 11.3.1.1 Power Law Utility -- 11.3.1.2 Exponential Utility -- 11.3.2 Performance Evaluation and Comparison -- 11.4 Summary and Conclusions -- Part VI Conclusion -- Chapter 12 Challenges and Opportunities in the IoT Space -- 12.1 Broader Insights and Future Directions -- 12.1.1 Distributed Cross‐Layer Intelligence for Mission‐Critical IoT Services -- 12.1.1.1 Secure and Resilient Networking for Massive IoT Networks.
12.1.1.2 Autonomic Networked CPS: From Military to Civilian Applications -- 12.1.1.3 Strategic Resource Provisioning for Mission‐Critical IoT Services -- 12.2 Future Research Directions -- 12.2.1 Distributed Learning and Data Fusion for Security and Resilience in IoT‐Driven Urban Applications -- 12.2.1.1 Data‐Driven Learning and Decision‐Making for Smart City Service Provisioning -- 12.2.1.2 Market Design for On‐Demand and Managed IoT‐Enabled Urban Services -- 12.2.1.3 Proactive Resiliency Planning and Learning for Disaster Management in Cities -- 12.2.2 Supply Chain Security and Resilience of IoT -- 12.3 Concluding Remarks -- Bibliography -- Index -- EULA.
Record Nr. UNINA-9910555258303321
Farooq Junaid  
Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Resource management for on-demand mission-critical internet of things applications / / Junaid Farooq, Quanyan Zhu
Resource management for on-demand mission-critical internet of things applications / / Junaid Farooq, Quanyan Zhu
Autore Farooq Junaid
Pubbl/distr/stampa Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2021]
Descrizione fisica 1 online resource (227 pages)
Disciplina 004.678
Collana IEEE Press
Soggetto topico Internet of things
ISBN 1-119-71612-8
1-119-71611-X
1-119-71610-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Acronyms -- Part I Introduction -- Chapter 1 Internet of Things‐Enabled Systems and Infrastructure -- 1.1 Cyber-Physical Realm of IoT -- 1.2 IoT in Mission‐Critical Applications -- 1.3 Overview of the Book -- 1.3.1 Main Topics -- 1.3.1.1 Dynamic Reservation of Wireless Spectrum Resources -- 1.3.1.2 Dynamic Cross‐Layer Connectivity Using Aerial Networks -- 1.3.1.3 Dynamic Processes Over Multiplex Spatial Networks and Reconfigurable Design -- 1.3.1.4 Sequential Resource Allocation Under Spatio‐Temporal Uncertainties -- 1.3.2 Notations -- Chapter 2 Resource Management in IoT‐Enabled Interdependent Infrastructure -- 2.1 System Complexity and Scale -- 2.2 Network Geometry and Dynamics -- 2.3 On‐Demand MC‐IoT Services and Decision Avenues -- 2.4 Performance Metrics -- 2.5 Overview of Scientific Methodologies -- Part II Design Challenges in MC‐IoT -- Chapter 3 Wireless Connectivity Challenges -- 3.1 Spectrum Scarcity and Reservation Based Access -- 3.2 Connectivity in Remote Environments -- 3.3 IoT Networks in Adversarial Environments -- Chapter 4 Resource and Service Provisioning Challenges -- 4.1 Efficient Allocation of Cloud Computing Resources -- 4.2 Dynamic Pricing in the Cloud -- 4.3 Spatio‐Temporal Urban Service Provisioning -- Part III Wireless Connectivity Mechanisms for MC‐IoT -- Chapter 5 Reservation‐Based Spectrum Access Contracts -- 5.1 Reservation of Time-Frequency Blocks in the Spectrum -- 5.1.1 Network Model -- 5.1.2 Utility of Spectrum Reservation -- 5.2 Dynamic Contract Formulation -- 5.2.1 Objective of Network Operator -- 5.2.2 Spectrum Reservation Contract -- 5.2.2.1 Operator Profitability -- 5.2.2.2 IC and IR Constraints -- 5.2.3 Optimal Contracting Problem -- 5.2.4 Solution to the Optimization Problem -- 5.3 Mission‐Oriented Pricing and Refund Policies.
5.4 Summary and Conclusion -- Chapter 6 Resilient Connectivity of IoT Using Aerial Networks -- 6.1 Connectivity in the Absence of Backhaul Networks -- 6.2 Aerial Base Station Modeling -- 6.3 Dynamic Coverage and Connectivity Mechanism -- 6.3.1 MAP-MSD Matching -- 6.3.2 MAP Dynamics and Objective -- 6.3.3 Controller Design -- 6.3.3.1 Attractive and Repulsive Function -- 6.3.3.2 Velocity Consensus Function -- 6.3.4 Individual Goal Function -- 6.3.5 Cluster Centers -- 6.4 Performance Evaluation and Simulation Results -- 6.4.1 Results and Discussion -- 6.4.1.1 Simulation Parameters -- 6.4.1.2 Resilience -- 6.4.1.3 Comparison -- 6.5 Summary and Conclusion -- Part IV Secure Network Design Mechanisms -- Chapter 7 Wireless IoT Network Design in Adversarial Environments -- 7.1 Adversarial Network Scenarios -- 7.2 Modeling Device Capabilities and Network Heterogeneity -- 7.2.1 Network Geometry -- 7.2.2 Network Connectivity -- 7.2.2.1 Intra‐layer Connectivity -- 7.2.2.2 Network‐wide Connectivity -- 7.3 Information Dissemination Under Attacks -- 7.3.1 Information Dynamics -- 7.3.1.1 Single Message Propagation -- 7.3.1.2 Multiple Message Propagation -- 7.3.2 Steady State Analysis -- 7.4 Mission‐Specific Network Optimization -- 7.4.1 Equilibrium Solution -- 7.4.2 Secure and Reconfigurable Network Design -- 7.5 Simulation Results and Validation -- 7.5.1 Mission Scenarios -- 7.5.1.1 Intelligence -- 7.5.1.2 Encounter Battle -- 7.6 Summary and Conclusion -- Chapter 8 Network Defense Mechanisms Against Malware Infiltration -- 8.1 Malware Infiltration and Botnets -- 8.1.1 Network Model -- 8.1.2 Threat Model -- 8.2 Propagation Modeling and Analysis -- 8.2.1 Modeling of Malware and Information Evolution -- 8.2.2 State Space Representation and Dynamics -- 8.2.3 Analysis of Equilibrium State -- 8.3 Patching Mechanism for Network Defense -- 8.3.1 Simulation Results.
8.3.2 Simulation and Validation -- 8.4 Summary and Conclusion -- Part V Resource Provisioning Mechanisms -- Chapter 9 Revenue Maximizing Cloud Resource Allocation -- 9.1 Cloud Service Provider Resource Allocation Problem -- 9.2 Allocation and Pricing Rule -- 9.3 Dynamic Revenue Maximization -- 9.3.1 Adaptive and Resilient Allocation and Pricing Policy -- 9.4 Numerical Results and Discussions -- 9.5 Summary and Conclusion -- Chapter 10 Dynamic Pricing of Fog‐Enabled MC‐IoT Applications -- 10.1 Edge Computing and Delay Modeling -- 10.2 Allocation Efficiency and Quality of Experience -- 10.2.1 Allocation Policy -- 10.2.2 Pricing Policy -- 10.3 Optimal Allocation and Pricing Rules -- 10.3.1 Single VMI Case -- 10.3.2 Multiple VMI Case -- 10.3.3 Expected Revenue -- 10.3.4 Implementation of Dynamic VMI Allocation and Pricing -- 10.4 Numerical Experiments and Discussion -- 10.4.1 Experiment Setup -- 10.4.2 Simulation Results -- 10.4.3 Comparison with Other Approaches -- 10.5 Summary and Conclusion -- Chapter 11 Resource Provisioning to Spatio‐Temporal Urban Services -- 11.1 Spatio‐Temporal Modeling of Urban Service Requests -- 11.1.1 Characterization of Service Requests -- 11.1.2 Utility of Resource Allocation -- 11.1.3 Problem Definition -- 11.2 Optimal Dynamic Allocation Mechanism -- 11.2.1 Dynamic Programming Solution -- 11.2.2 Computation and Implementation -- 11.3 Numerical Results and Discussion -- 11.3.1 Special Cases -- 11.3.1.1 Power Law Utility -- 11.3.1.2 Exponential Utility -- 11.3.2 Performance Evaluation and Comparison -- 11.4 Summary and Conclusions -- Part VI Conclusion -- Chapter 12 Challenges and Opportunities in the IoT Space -- 12.1 Broader Insights and Future Directions -- 12.1.1 Distributed Cross‐Layer Intelligence for Mission‐Critical IoT Services -- 12.1.1.1 Secure and Resilient Networking for Massive IoT Networks.
12.1.1.2 Autonomic Networked CPS: From Military to Civilian Applications -- 12.1.1.3 Strategic Resource Provisioning for Mission‐Critical IoT Services -- 12.2 Future Research Directions -- 12.2.1 Distributed Learning and Data Fusion for Security and Resilience in IoT‐Driven Urban Applications -- 12.2.1.1 Data‐Driven Learning and Decision‐Making for Smart City Service Provisioning -- 12.2.1.2 Market Design for On‐Demand and Managed IoT‐Enabled Urban Services -- 12.2.1.3 Proactive Resiliency Planning and Learning for Disaster Management in Cities -- 12.2.2 Supply Chain Security and Resilience of IoT -- 12.3 Concluding Remarks -- Bibliography -- Index -- EULA.
Record Nr. UNINA-9910830377003321
Farooq Junaid  
Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and resilience of control systems : theory and applications / / editors, Hideaki Ishii, Quanyan Zhu
Security and resilience of control systems : theory and applications / / editors, Hideaki Ishii, Quanyan Zhu
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (229 pages) : illustrations (chiefly color)
Disciplina 005.8
Collana Lecture notes in control and information sciences
Soggetto topico Cooperating objects (Computer systems)
Computer security
ISBN 3-030-83236-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910523900603321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui