A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design [[electronic resource] /] / by Juntao Chen, Quanyan Zhu |
Autore | Chen Juntao |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (111 pages) |
Disciplina | 004.6 |
Collana | SpringerBriefs in Control, Automation and Robotics |
Soggetto topico |
Electrical engineering
Game theory Computer communication systems Control engineering Communications Engineering, Networks Game Theory, Economics, Social and Behav. Sciences Computer Communication Networks Control and Systems Theory |
ISBN | 3-030-23444-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | I: Introduction -- II: Background of Game Theory and Network Science -- III: Meta-Network Modeling and Resilience Analysis -- IV: Interdependent Complex Networks -- V: Interdependent Critical Infrastructure Networks -- VI: Conclusions. |
Record Nr. | UNINA-9910366604703321 |
Chen Juntao
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Industrial Control Systems Security and Resiliency [[electronic resource] ] : Practice and Theory / / edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (277 pages) |
Disciplina | 658.478 |
Collana | Advances in Information Security |
Soggetto topico |
Data protection
Computer communication systems Electrical engineering Artificial intelligence Security Computer Communication Networks Communications Engineering, Networks Artificial Intelligence |
ISBN | 3-030-18214-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience. |
Record Nr. | UNINA-9910349285603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IoT supply chain security risk analysis and mitigation : modeling, computations, and software tools / / Timothy Kieras, Junaid Farooq and Quanyan Zhu |
Autore | Kieras Timothy |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (142 pages) |
Disciplina | 658.7 |
Collana | SpringerBriefs in computer science |
Soggetto topico |
Business logistics
Business logistics - Security measures Internet of things - Security measures |
ISBN | 3-031-08480-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Acknowledgments -- Contents -- Acronyms -- 1 IoT and Supply Chain Security -- 1.1 Vendor Landscape of IoT Systems -- 1.2 Brief Taxonomy of Supply Chain Security -- 1.3 IoT Supply Chain Risk: Hard to Observe and Hard to Control -- 1.3.1 Dissecting Supply Chain Links in IoT -- 1.4 IoT Risk Implications and Consequences -- 1.4.1 Key Features of IoT Security -- 1.5 Challenges in Cyber Supply Chain Risk Analysis of IoT -- 1.6 Supply Chain Resilience -- 1.6.1 Top-Down Approach to Managing Risk -- 1.6.2 Bottom-Up Approach to Managing Risk -- 1.7 Overview of the Book -- References -- 2 Risk Modeling and Analysis -- 2.1 Risk Scoring in Component Graphs -- 2.1.1 Introduction -- 2.1.2 Related Work -- 2.1.3 Contributions -- 2.2 System Model for Risk Assessment -- 2.2.1 Model Definitions -- 2.2.1.1 Component Security Graph -- 2.2.1.2 System Supplier Network -- 2.2.2 Supplier Trust -- 2.2.3 Systemic Risk Graph -- 2.3 Risk Analysis Metrics -- 2.3.1 Systemic Risk Function -- 2.3.2 Supplier Involvement Measure -- 2.4 Uncertainties in Model Development -- 2.4.1 Parametric Uncertainties in Probability Estimates -- 2.4.2 Structural Modeling Uncertainties -- 2.5 Uncertainty Case Studies -- 2.5.1 Case 0: Ground Truth -- 2.5.2 Case 1: Uncertainty of Single Node Logic -- 2.5.3 Case 2: Uncertainty of Node Omission -- 2.5.4 Case 3: Uncertainty in Edge Placement -- 2.5.5 Case 4: Uncertainty in Probability Values -- 2.6 Conclusion -- References -- 3 Risk Mitigation Decisions -- 3.1 Cost Effective Vendor Selection -- 3.1.1 Strict Supplier Choice Problem -- 3.2 Supply Chain Diversification -- 3.2.1 Component Security Risk Minimization Problem -- 3.2.2 Supplier Involvement Minimization Problem -- 3.2.3 Relaxed Supplier Choice Problem -- 3.3 Case Study and Results -- 3.3.1 Simulation Setup -- 3.3.2 Example Scenarios and Results.
3.3.3 Supplier Involvement Experiments -- 3.4 Conclusion -- References -- 4 Policy Management -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Accountability Models in IoT Supply Chain -- 4.3.1 Running Examples -- 4.3.2 System Modeling -- 4.3.3 Accountability Investigation -- 4.3.4 Model Extensions -- 4.3.4.1 Single Supplier with Multiple Types -- 4.3.4.2 Multiple Suppliers -- 4.4 Case Study 1: Autonomous Truck Platooning -- 4.4.1 Background -- 4.4.2 Vehicle Dynamics Model -- 4.4.3 Accountability Testing -- 4.4.4 Parameter Analysis -- 4.4.5 Investigation Performance -- 4.4.5.1 Accountability Receiver Operating Characteristic -- 4.4.5.2 Area Under the AROC Curve -- 4.5 Case Study 2: Ransomware in IoT Supply Chain -- 4.5.1 Background -- 4.5.2 Smart Lock and Ransomware Attack -- 4.5.3 Accountability Investigation -- 4.5.3.1 Tier-1 Investigation -- 4.5.3.2 Multi-Stage Accountability Investigation -- 4.6 Compliance and Cyber Insurance -- 4.6.1 Compliance Modeling -- 4.6.2 Contract Design -- 4.6.3 Cyber Insurance -- 4.6.3.1 Background Introduction -- 4.6.3.2 Insurance Policy Design -- 4.6.3.3 Maximum Premium with Full Coverage -- 4.6.3.4 Coverage Level with Given Premium -- 4.6.3.5 Trade-Off Between Accountability Investment and Cyber Insurance -- 4.7 Conclusion -- References -- 5 Computational Tools -- 5.1 Introduction to I-SCRAM: A Software Tool for IoT SCRM -- 5.1.1 Supply Chain Risk Analysis and Mitigation -- 5.1.1.1 I-SCRAM Software Components -- 5.1.1.2 User Interface -- 5.1.1.3 Data Model -- 5.1.1.4 Server -- 5.1.1.5 Implementation of Core Operations -- 5.2 Case Study 1: Autonomous Vehicle -- 5.3 Case Study 2: Industrial Control System -- 5.4 Conclusions and Outlooks -- References -- Index. |
Record Nr. | UNINA-9910592984403321 |
Kieras Timothy
![]() |
||
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IoT supply chain security risk analysis and mitigation : modeling, computations, and software tools / / Timothy Kieras, Junaid Farooq and Quanyan Zhu |
Autore | Kieras Timothy |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (142 pages) |
Disciplina | 658.7 |
Collana | SpringerBriefs in computer science |
Soggetto topico |
Business logistics
Business logistics - Security measures Internet of things - Security measures |
ISBN | 3-031-08480-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Acknowledgments -- Contents -- Acronyms -- 1 IoT and Supply Chain Security -- 1.1 Vendor Landscape of IoT Systems -- 1.2 Brief Taxonomy of Supply Chain Security -- 1.3 IoT Supply Chain Risk: Hard to Observe and Hard to Control -- 1.3.1 Dissecting Supply Chain Links in IoT -- 1.4 IoT Risk Implications and Consequences -- 1.4.1 Key Features of IoT Security -- 1.5 Challenges in Cyber Supply Chain Risk Analysis of IoT -- 1.6 Supply Chain Resilience -- 1.6.1 Top-Down Approach to Managing Risk -- 1.6.2 Bottom-Up Approach to Managing Risk -- 1.7 Overview of the Book -- References -- 2 Risk Modeling and Analysis -- 2.1 Risk Scoring in Component Graphs -- 2.1.1 Introduction -- 2.1.2 Related Work -- 2.1.3 Contributions -- 2.2 System Model for Risk Assessment -- 2.2.1 Model Definitions -- 2.2.1.1 Component Security Graph -- 2.2.1.2 System Supplier Network -- 2.2.2 Supplier Trust -- 2.2.3 Systemic Risk Graph -- 2.3 Risk Analysis Metrics -- 2.3.1 Systemic Risk Function -- 2.3.2 Supplier Involvement Measure -- 2.4 Uncertainties in Model Development -- 2.4.1 Parametric Uncertainties in Probability Estimates -- 2.4.2 Structural Modeling Uncertainties -- 2.5 Uncertainty Case Studies -- 2.5.1 Case 0: Ground Truth -- 2.5.2 Case 1: Uncertainty of Single Node Logic -- 2.5.3 Case 2: Uncertainty of Node Omission -- 2.5.4 Case 3: Uncertainty in Edge Placement -- 2.5.5 Case 4: Uncertainty in Probability Values -- 2.6 Conclusion -- References -- 3 Risk Mitigation Decisions -- 3.1 Cost Effective Vendor Selection -- 3.1.1 Strict Supplier Choice Problem -- 3.2 Supply Chain Diversification -- 3.2.1 Component Security Risk Minimization Problem -- 3.2.2 Supplier Involvement Minimization Problem -- 3.2.3 Relaxed Supplier Choice Problem -- 3.3 Case Study and Results -- 3.3.1 Simulation Setup -- 3.3.2 Example Scenarios and Results.
3.3.3 Supplier Involvement Experiments -- 3.4 Conclusion -- References -- 4 Policy Management -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Accountability Models in IoT Supply Chain -- 4.3.1 Running Examples -- 4.3.2 System Modeling -- 4.3.3 Accountability Investigation -- 4.3.4 Model Extensions -- 4.3.4.1 Single Supplier with Multiple Types -- 4.3.4.2 Multiple Suppliers -- 4.4 Case Study 1: Autonomous Truck Platooning -- 4.4.1 Background -- 4.4.2 Vehicle Dynamics Model -- 4.4.3 Accountability Testing -- 4.4.4 Parameter Analysis -- 4.4.5 Investigation Performance -- 4.4.5.1 Accountability Receiver Operating Characteristic -- 4.4.5.2 Area Under the AROC Curve -- 4.5 Case Study 2: Ransomware in IoT Supply Chain -- 4.5.1 Background -- 4.5.2 Smart Lock and Ransomware Attack -- 4.5.3 Accountability Investigation -- 4.5.3.1 Tier-1 Investigation -- 4.5.3.2 Multi-Stage Accountability Investigation -- 4.6 Compliance and Cyber Insurance -- 4.6.1 Compliance Modeling -- 4.6.2 Contract Design -- 4.6.3 Cyber Insurance -- 4.6.3.1 Background Introduction -- 4.6.3.2 Insurance Policy Design -- 4.6.3.3 Maximum Premium with Full Coverage -- 4.6.3.4 Coverage Level with Given Premium -- 4.6.3.5 Trade-Off Between Accountability Investment and Cyber Insurance -- 4.7 Conclusion -- References -- 5 Computational Tools -- 5.1 Introduction to I-SCRAM: A Software Tool for IoT SCRM -- 5.1.1 Supply Chain Risk Analysis and Mitigation -- 5.1.1.1 I-SCRAM Software Components -- 5.1.1.2 User Interface -- 5.1.1.3 Data Model -- 5.1.1.4 Server -- 5.1.1.5 Implementation of Core Operations -- 5.2 Case Study 1: Autonomous Vehicle -- 5.3 Case Study 2: Industrial Control System -- 5.4 Conclusions and Outlooks -- References -- Index. |
Record Nr. | UNISA-996490366203316 |
Kieras Timothy
![]() |
||
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Network Games, Control, and Optimization [[electronic resource] ] : Proceedings of NETGCOOP 2018, New York, NY / / edited by Jean Walrand, Quanyan Zhu, Yezekael Hayel, Tania Jimenez |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2019 |
Descrizione fisica | 1 online resource (293 pages) |
Disciplina | 519.3 |
Collana | Static & Dynamic Game Theory: Foundations & Applications |
Soggetto topico |
Game theory
System theory Computer science—Mathematics Computer mathematics Game Theory, Economics, Social and Behav. Sciences Systems Theory, Control Mathematical Applications in Computer Science Math Applications in Computer Science |
ISBN | 3-030-10880-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Pricing of Coexisting Cellular and Community Networks -- Achieving Arbitrary Throughput-Fairness Trade-offs in the Inter Cell Interference Coordination with Fixed Transmit Power Problem -- Coexistence of LTE-Unlicensed and WiFi with Optimal Channel Aggregation -- Analysis of Sponsored Data Practices in the Case of Competing Wireless Service Providers -- Media delivery competition with edge cloud, remote cloud and networking -- An Algorithmic Framework for Geo-Distributed Analytics -- The Stackelberg Equilibria of the Kelly Mechanism -- To Participate or Not in a Coalition in Adversarial Games -- On the Asymptotic Content Routing Stretch in Network of Caches: Impact of Popularity Learning -- Tiered Spectrum Measurement Markets for Licensed Secondary Spectrum -- On Incremental Passivity in Network Games -- Impact of social connectivity on herding behavior -- A truthful auction mechanism for dynamic allocation of LSA spectrum blocks for 5G -- Routing game with nonseparable costs for EV driving and charging incentive design -- The Social Medium Selection Game -- Public Good Provision Games on Networks with Resource Pooling. |
Record Nr. | UNINA-9910338249003321 |
Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Resource management for on-demand mission-critical internet of things applications / / Junaid Farooq, Quanyan Zhu |
Autore | Farooq Junaid |
Pubbl/distr/stampa | Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2021] |
Descrizione fisica | 1 online resource (227 pages) |
Disciplina | 004.678 |
Collana | IEEE Press Ser. |
Soggetto topico | Internet of things |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-71612-8
1-119-71611-X 1-119-71610-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Acronyms -- Part I Introduction -- Chapter 1 Internet of Things‐Enabled Systems and Infrastructure -- 1.1 Cyber-Physical Realm of IoT -- 1.2 IoT in Mission‐Critical Applications -- 1.3 Overview of the Book -- 1.3.1 Main Topics -- 1.3.1.1 Dynamic Reservation of Wireless Spectrum Resources -- 1.3.1.2 Dynamic Cross‐Layer Connectivity Using Aerial Networks -- 1.3.1.3 Dynamic Processes Over Multiplex Spatial Networks and Reconfigurable Design -- 1.3.1.4 Sequential Resource Allocation Under Spatio‐Temporal Uncertainties -- 1.3.2 Notations -- Chapter 2 Resource Management in IoT‐Enabled Interdependent Infrastructure -- 2.1 System Complexity and Scale -- 2.2 Network Geometry and Dynamics -- 2.3 On‐Demand MC‐IoT Services and Decision Avenues -- 2.4 Performance Metrics -- 2.5 Overview of Scientific Methodologies -- Part II Design Challenges in MC‐IoT -- Chapter 3 Wireless Connectivity Challenges -- 3.1 Spectrum Scarcity and Reservation Based Access -- 3.2 Connectivity in Remote Environments -- 3.3 IoT Networks in Adversarial Environments -- Chapter 4 Resource and Service Provisioning Challenges -- 4.1 Efficient Allocation of Cloud Computing Resources -- 4.2 Dynamic Pricing in the Cloud -- 4.3 Spatio‐Temporal Urban Service Provisioning -- Part III Wireless Connectivity Mechanisms for MC‐IoT -- Chapter 5 Reservation‐Based Spectrum Access Contracts -- 5.1 Reservation of Time-Frequency Blocks in the Spectrum -- 5.1.1 Network Model -- 5.1.2 Utility of Spectrum Reservation -- 5.2 Dynamic Contract Formulation -- 5.2.1 Objective of Network Operator -- 5.2.2 Spectrum Reservation Contract -- 5.2.2.1 Operator Profitability -- 5.2.2.2 IC and IR Constraints -- 5.2.3 Optimal Contracting Problem -- 5.2.4 Solution to the Optimization Problem -- 5.3 Mission‐Oriented Pricing and Refund Policies.
5.4 Summary and Conclusion -- Chapter 6 Resilient Connectivity of IoT Using Aerial Networks -- 6.1 Connectivity in the Absence of Backhaul Networks -- 6.2 Aerial Base Station Modeling -- 6.3 Dynamic Coverage and Connectivity Mechanism -- 6.3.1 MAP-MSD Matching -- 6.3.2 MAP Dynamics and Objective -- 6.3.3 Controller Design -- 6.3.3.1 Attractive and Repulsive Function -- 6.3.3.2 Velocity Consensus Function -- 6.3.4 Individual Goal Function -- 6.3.5 Cluster Centers -- 6.4 Performance Evaluation and Simulation Results -- 6.4.1 Results and Discussion -- 6.4.1.1 Simulation Parameters -- 6.4.1.2 Resilience -- 6.4.1.3 Comparison -- 6.5 Summary and Conclusion -- Part IV Secure Network Design Mechanisms -- Chapter 7 Wireless IoT Network Design in Adversarial Environments -- 7.1 Adversarial Network Scenarios -- 7.2 Modeling Device Capabilities and Network Heterogeneity -- 7.2.1 Network Geometry -- 7.2.2 Network Connectivity -- 7.2.2.1 Intra‐layer Connectivity -- 7.2.2.2 Network‐wide Connectivity -- 7.3 Information Dissemination Under Attacks -- 7.3.1 Information Dynamics -- 7.3.1.1 Single Message Propagation -- 7.3.1.2 Multiple Message Propagation -- 7.3.2 Steady State Analysis -- 7.4 Mission‐Specific Network Optimization -- 7.4.1 Equilibrium Solution -- 7.4.2 Secure and Reconfigurable Network Design -- 7.5 Simulation Results and Validation -- 7.5.1 Mission Scenarios -- 7.5.1.1 Intelligence -- 7.5.1.2 Encounter Battle -- 7.6 Summary and Conclusion -- Chapter 8 Network Defense Mechanisms Against Malware Infiltration -- 8.1 Malware Infiltration and Botnets -- 8.1.1 Network Model -- 8.1.2 Threat Model -- 8.2 Propagation Modeling and Analysis -- 8.2.1 Modeling of Malware and Information Evolution -- 8.2.2 State Space Representation and Dynamics -- 8.2.3 Analysis of Equilibrium State -- 8.3 Patching Mechanism for Network Defense -- 8.3.1 Simulation Results. 8.3.2 Simulation and Validation -- 8.4 Summary and Conclusion -- Part V Resource Provisioning Mechanisms -- Chapter 9 Revenue Maximizing Cloud Resource Allocation -- 9.1 Cloud Service Provider Resource Allocation Problem -- 9.2 Allocation and Pricing Rule -- 9.3 Dynamic Revenue Maximization -- 9.3.1 Adaptive and Resilient Allocation and Pricing Policy -- 9.4 Numerical Results and Discussions -- 9.5 Summary and Conclusion -- Chapter 10 Dynamic Pricing of Fog‐Enabled MC‐IoT Applications -- 10.1 Edge Computing and Delay Modeling -- 10.2 Allocation Efficiency and Quality of Experience -- 10.2.1 Allocation Policy -- 10.2.2 Pricing Policy -- 10.3 Optimal Allocation and Pricing Rules -- 10.3.1 Single VMI Case -- 10.3.2 Multiple VMI Case -- 10.3.3 Expected Revenue -- 10.3.4 Implementation of Dynamic VMI Allocation and Pricing -- 10.4 Numerical Experiments and Discussion -- 10.4.1 Experiment Setup -- 10.4.2 Simulation Results -- 10.4.3 Comparison with Other Approaches -- 10.5 Summary and Conclusion -- Chapter 11 Resource Provisioning to Spatio‐Temporal Urban Services -- 11.1 Spatio‐Temporal Modeling of Urban Service Requests -- 11.1.1 Characterization of Service Requests -- 11.1.2 Utility of Resource Allocation -- 11.1.3 Problem Definition -- 11.2 Optimal Dynamic Allocation Mechanism -- 11.2.1 Dynamic Programming Solution -- 11.2.2 Computation and Implementation -- 11.3 Numerical Results and Discussion -- 11.3.1 Special Cases -- 11.3.1.1 Power Law Utility -- 11.3.1.2 Exponential Utility -- 11.3.2 Performance Evaluation and Comparison -- 11.4 Summary and Conclusions -- Part VI Conclusion -- Chapter 12 Challenges and Opportunities in the IoT Space -- 12.1 Broader Insights and Future Directions -- 12.1.1 Distributed Cross‐Layer Intelligence for Mission‐Critical IoT Services -- 12.1.1.1 Secure and Resilient Networking for Massive IoT Networks. 12.1.1.2 Autonomic Networked CPS: From Military to Civilian Applications -- 12.1.1.3 Strategic Resource Provisioning for Mission‐Critical IoT Services -- 12.2 Future Research Directions -- 12.2.1 Distributed Learning and Data Fusion for Security and Resilience in IoT‐Driven Urban Applications -- 12.2.1.1 Data‐Driven Learning and Decision‐Making for Smart City Service Provisioning -- 12.2.1.2 Market Design for On‐Demand and Managed IoT‐Enabled Urban Services -- 12.2.1.3 Proactive Resiliency Planning and Learning for Disaster Management in Cities -- 12.2.2 Supply Chain Security and Resilience of IoT -- 12.3 Concluding Remarks -- Bibliography -- Index -- EULA. |
Record Nr. | UNINA-9910555258303321 |
Farooq Junaid
![]() |
||
Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Resource management for on-demand mission-critical internet of things applications / / Junaid Farooq, Quanyan Zhu |
Autore | Farooq Junaid |
Pubbl/distr/stampa | Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2021] |
Descrizione fisica | 1 online resource (227 pages) |
Disciplina | 004.678 |
Collana | IEEE Press |
Soggetto topico | Internet of things |
ISBN |
1-119-71612-8
1-119-71611-X 1-119-71610-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Acronyms -- Part I Introduction -- Chapter 1 Internet of Things‐Enabled Systems and Infrastructure -- 1.1 Cyber-Physical Realm of IoT -- 1.2 IoT in Mission‐Critical Applications -- 1.3 Overview of the Book -- 1.3.1 Main Topics -- 1.3.1.1 Dynamic Reservation of Wireless Spectrum Resources -- 1.3.1.2 Dynamic Cross‐Layer Connectivity Using Aerial Networks -- 1.3.1.3 Dynamic Processes Over Multiplex Spatial Networks and Reconfigurable Design -- 1.3.1.4 Sequential Resource Allocation Under Spatio‐Temporal Uncertainties -- 1.3.2 Notations -- Chapter 2 Resource Management in IoT‐Enabled Interdependent Infrastructure -- 2.1 System Complexity and Scale -- 2.2 Network Geometry and Dynamics -- 2.3 On‐Demand MC‐IoT Services and Decision Avenues -- 2.4 Performance Metrics -- 2.5 Overview of Scientific Methodologies -- Part II Design Challenges in MC‐IoT -- Chapter 3 Wireless Connectivity Challenges -- 3.1 Spectrum Scarcity and Reservation Based Access -- 3.2 Connectivity in Remote Environments -- 3.3 IoT Networks in Adversarial Environments -- Chapter 4 Resource and Service Provisioning Challenges -- 4.1 Efficient Allocation of Cloud Computing Resources -- 4.2 Dynamic Pricing in the Cloud -- 4.3 Spatio‐Temporal Urban Service Provisioning -- Part III Wireless Connectivity Mechanisms for MC‐IoT -- Chapter 5 Reservation‐Based Spectrum Access Contracts -- 5.1 Reservation of Time-Frequency Blocks in the Spectrum -- 5.1.1 Network Model -- 5.1.2 Utility of Spectrum Reservation -- 5.2 Dynamic Contract Formulation -- 5.2.1 Objective of Network Operator -- 5.2.2 Spectrum Reservation Contract -- 5.2.2.1 Operator Profitability -- 5.2.2.2 IC and IR Constraints -- 5.2.3 Optimal Contracting Problem -- 5.2.4 Solution to the Optimization Problem -- 5.3 Mission‐Oriented Pricing and Refund Policies.
5.4 Summary and Conclusion -- Chapter 6 Resilient Connectivity of IoT Using Aerial Networks -- 6.1 Connectivity in the Absence of Backhaul Networks -- 6.2 Aerial Base Station Modeling -- 6.3 Dynamic Coverage and Connectivity Mechanism -- 6.3.1 MAP-MSD Matching -- 6.3.2 MAP Dynamics and Objective -- 6.3.3 Controller Design -- 6.3.3.1 Attractive and Repulsive Function -- 6.3.3.2 Velocity Consensus Function -- 6.3.4 Individual Goal Function -- 6.3.5 Cluster Centers -- 6.4 Performance Evaluation and Simulation Results -- 6.4.1 Results and Discussion -- 6.4.1.1 Simulation Parameters -- 6.4.1.2 Resilience -- 6.4.1.3 Comparison -- 6.5 Summary and Conclusion -- Part IV Secure Network Design Mechanisms -- Chapter 7 Wireless IoT Network Design in Adversarial Environments -- 7.1 Adversarial Network Scenarios -- 7.2 Modeling Device Capabilities and Network Heterogeneity -- 7.2.1 Network Geometry -- 7.2.2 Network Connectivity -- 7.2.2.1 Intra‐layer Connectivity -- 7.2.2.2 Network‐wide Connectivity -- 7.3 Information Dissemination Under Attacks -- 7.3.1 Information Dynamics -- 7.3.1.1 Single Message Propagation -- 7.3.1.2 Multiple Message Propagation -- 7.3.2 Steady State Analysis -- 7.4 Mission‐Specific Network Optimization -- 7.4.1 Equilibrium Solution -- 7.4.2 Secure and Reconfigurable Network Design -- 7.5 Simulation Results and Validation -- 7.5.1 Mission Scenarios -- 7.5.1.1 Intelligence -- 7.5.1.2 Encounter Battle -- 7.6 Summary and Conclusion -- Chapter 8 Network Defense Mechanisms Against Malware Infiltration -- 8.1 Malware Infiltration and Botnets -- 8.1.1 Network Model -- 8.1.2 Threat Model -- 8.2 Propagation Modeling and Analysis -- 8.2.1 Modeling of Malware and Information Evolution -- 8.2.2 State Space Representation and Dynamics -- 8.2.3 Analysis of Equilibrium State -- 8.3 Patching Mechanism for Network Defense -- 8.3.1 Simulation Results. 8.3.2 Simulation and Validation -- 8.4 Summary and Conclusion -- Part V Resource Provisioning Mechanisms -- Chapter 9 Revenue Maximizing Cloud Resource Allocation -- 9.1 Cloud Service Provider Resource Allocation Problem -- 9.2 Allocation and Pricing Rule -- 9.3 Dynamic Revenue Maximization -- 9.3.1 Adaptive and Resilient Allocation and Pricing Policy -- 9.4 Numerical Results and Discussions -- 9.5 Summary and Conclusion -- Chapter 10 Dynamic Pricing of Fog‐Enabled MC‐IoT Applications -- 10.1 Edge Computing and Delay Modeling -- 10.2 Allocation Efficiency and Quality of Experience -- 10.2.1 Allocation Policy -- 10.2.2 Pricing Policy -- 10.3 Optimal Allocation and Pricing Rules -- 10.3.1 Single VMI Case -- 10.3.2 Multiple VMI Case -- 10.3.3 Expected Revenue -- 10.3.4 Implementation of Dynamic VMI Allocation and Pricing -- 10.4 Numerical Experiments and Discussion -- 10.4.1 Experiment Setup -- 10.4.2 Simulation Results -- 10.4.3 Comparison with Other Approaches -- 10.5 Summary and Conclusion -- Chapter 11 Resource Provisioning to Spatio‐Temporal Urban Services -- 11.1 Spatio‐Temporal Modeling of Urban Service Requests -- 11.1.1 Characterization of Service Requests -- 11.1.2 Utility of Resource Allocation -- 11.1.3 Problem Definition -- 11.2 Optimal Dynamic Allocation Mechanism -- 11.2.1 Dynamic Programming Solution -- 11.2.2 Computation and Implementation -- 11.3 Numerical Results and Discussion -- 11.3.1 Special Cases -- 11.3.1.1 Power Law Utility -- 11.3.1.2 Exponential Utility -- 11.3.2 Performance Evaluation and Comparison -- 11.4 Summary and Conclusions -- Part VI Conclusion -- Chapter 12 Challenges and Opportunities in the IoT Space -- 12.1 Broader Insights and Future Directions -- 12.1.1 Distributed Cross‐Layer Intelligence for Mission‐Critical IoT Services -- 12.1.1.1 Secure and Resilient Networking for Massive IoT Networks. 12.1.1.2 Autonomic Networked CPS: From Military to Civilian Applications -- 12.1.1.3 Strategic Resource Provisioning for Mission‐Critical IoT Services -- 12.2 Future Research Directions -- 12.2.1 Distributed Learning and Data Fusion for Security and Resilience in IoT‐Driven Urban Applications -- 12.2.1.1 Data‐Driven Learning and Decision‐Making for Smart City Service Provisioning -- 12.2.1.2 Market Design for On‐Demand and Managed IoT‐Enabled Urban Services -- 12.2.1.3 Proactive Resiliency Planning and Learning for Disaster Management in Cities -- 12.2.2 Supply Chain Security and Resilience of IoT -- 12.3 Concluding Remarks -- Bibliography -- Index -- EULA. |
Record Nr. | UNINA-9910830377003321 |
Farooq Junaid
![]() |
||
Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and resilience of control systems : theory and applications / / editors, Hideaki Ishii, Quanyan Zhu |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (229 pages) : illustrations (chiefly color) |
Disciplina | 005.8 |
Collana | Lecture notes in control and information sciences |
Soggetto topico |
Cooperating objects (Computer systems)
Computer security |
ISBN | 3-030-83236-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910523900603321 |
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|