Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Sunil Cheruvu"'
Demystifying Intelligent Multimode Security Systems : An Edge-to-Cloud Cybersecurity Solutions Guide
This open access book. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solu
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and t
Publikováno v:
Demystifying Internet of Things Security ISBN: 9781484228951
Historically, the attacks on platforms have been transitioning from application-level software (SW) to user mode SW to kernel mode SW to firmware (FW) and now hardware (HW). The frequency of HW- and FW-level vulnerabilities increased substantially fr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b1b0f53de47c218c4219482868833fe
https://doi.org/10.1007/978-1-4842-2896-8_3
https://doi.org/10.1007/978-1-4842-2896-8_3
Publikováno v:
Demystifying Internet of Things Security ISBN: 9781484228951
Internet of Things (IoT) is a set of technologies that are enabling new use cases and delivering services across a wide variety of markets and applications. When people think of IoT, they often think of home or personal IoT. However, IoT will play a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ae9208141d05fea79714238e3a4e99fc
https://doi.org/10.1007/978-1-4842-2896-8_5
https://doi.org/10.1007/978-1-4842-2896-8_5
Publikováno v:
Demystifying Internet of Things Security ISBN: 9781484228951
In Chapter 1 we explored device cost dynamics when security is built-in from the beginning. Either the cost of the device increases or the ratio of device resources attributed to non-security-related functionality decreases. However, ignoring securit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9fadce519c9ed6e2dedd121bc4c524e1
https://doi.org/10.1007/978-1-4842-2896-8_2
https://doi.org/10.1007/978-1-4842-2896-8_2
Publikováno v:
Demystifying Internet of Things Security ISBN: 9781484228951
In this chapter we relate several iconic attacks on cyber-physical IoT systems to illustrate the clever ways attackers are able to achieve their objectives. The physicality of cyber-physical systems and resource limitations of constrained IoT devices
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4d3bef8a4d966000ebefb684cf7520f3
https://doi.org/10.1007/978-1-4842-2896-8_1
https://doi.org/10.1007/978-1-4842-2896-8_1