Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Table of Contents List of Contributors Foreword Preface Acknowledgments Chapter 1: Overview of Security and Privacy in Cyber-Physical Systems
1.1 Introduction 1.2 Defining Security and Privacy 1.3 Defining Cyber-Physical Systems 1.4 Examples of Security and Privacy in Action 1.5 Approaches to Secure Cyber-Physical Systems 1.6 Ongoing Security and Privacy Challenges for CPSs 1.7 Conclusion References
Chapter 2: Network Security and Privacy for Cyber-Physical Systems
2.1 Introduction 2.2 Security and Privacy Issues in CPSs 2.3 Local Network Security for CPSs 2.4 Internet-Wide Secure Communication 2.5 Security and Privacy for Cloud-Interconnected CPSs 2.6 Summary 2.7 Conclusion and Outlook Acknowledgments References
Chapter 3: Tutorial on Information Theoretic Metrics Quantifying Privacy in Cyber-Physical Systems
3.1 Social Perspective and Motivation 3.2 Information Theoretic Privacy Measures 3.3 Privacy Models and Protection 3.5 Conclusion and Outlook Appendix A Derivation of the Mutual Information Based on the KLD Appendix B Derivation of the Mutual Information In Terms of Entropy Appendix C Derivation of the Mutual Information Conditioned on x Appendix D Proof of Corollary 3.1 References
Chapter 4: Cyber-Physical Systems and National Security Concerns
4.1 Introduction 4.2 National Security Concerns Arising from Cyber-Physical Systems 4.3 National Security Implications of Attacks on Cyber-Physical Systems 4.4 Conclusion References
Chapter 5: Legal Considerations of Cyber-Physical Systems and the Internet of Things
5.1 Introduction 5.2 Privacy and Technology in Recent History 5.3 The Current State of Privacy Law 5.4 Meeting Future Challenges References
Chapter 6: Key Management in CPSs
6.1 Introduction 6.2 Key Management Security Goals and Threat Model 6.3 CPS Key Management Design Principles 6.4 CPS Key Management 6.5 CPS Key Management Challenges and Open Research Issues 6.6 Summary References
Chapter 7: Secure Registration and Remote Attestation of IoT Devices Joining the Cloud: The Stack4Things Case of Study
7.1 Introduction 7.2 Background 7.3 Reference Scenario and Motivation 7.4 Stack4Things Architecture 7.5 Capabilities for Making IoT Devices Secure Over the Cloud 7.6 Adding Security Capabilities to Stack4Things 7.7 Conclusion References
Chapter 8: Context Awareness for Adaptive Access Control Management in IoT Environments
8.1 Introduction 8.2 Security Challenges in IoT Environments 8.3 Surveying Access Control Models and Solutions for IoT 8.4 Access Control Adaptation: Motivations and Design Guidelines 8.5 Our Adaptive Context-Aware Access Control Solution for Smart Objects 8.6 Open Technical Challenges and Concluding Remarks References
Chapter 9: Data Privacy Issues in Distributed Security Monitoring Systems
9.1 Information Security in Distributed Data Collection Systems 9.2 Technical Approaches for Assuring Information Security 9.3 Approaches for Building Trust in Data Collection Systems 9.4 Conclusion References
Chapter 10: Privacy Protection for Cloud-Based Robotic Networks
10.1 Introduction 10.2 Cloud Robot Network: Use Case, Challenges, and Security Requirements 10.3 Establishment of Cloud Robot Networks 10.4 Communication Security 10.5 Security Management of Cloud Robot Networks 10.6 Related Work 10.7 Conclusion References
Chapter 11: Toward Network Coding for Cyber-Physical Systems: Security Challenges and Applications
11.1 Introduction 11.2 Background on Network Coding and Its Applications 11.3 Security Challenges 11.4 Secure Network Coding 11.5 Applications of Network Coding in Providing Security 11.6 Conclusion Acknowledgment References
Chapter 12: Lightweight Crypto and Security
12.1 Introduction 12.2 Cyber-Physical Systems 12.3 Security and Privacy in Cyber-Physical Systems 12.4 Lightweight Cryptography Implementations for Security and Privacy in CPSs 12.5 Opportunities and Challenges 12.6 Conclusion Acknowledgments References
Chapter 13: Cyber-Physical Vulnerabilities of Wireless Sensor Networks in Smart Cities
13.1 Introduction 13.2 WSN Applications in Smart Cities 13.3 Cyber-Physical Vulnerabilities 13.4 Solution Approaches 13.5 Conclusion Acknowledgment References
Chapter 14: Detecting Data Integrity Attacks in Smart Grid
14.1 Introduction 14.2 Literature Review 14.3 Network and Threat Models 14.4 Our Approach 14.5 Performance Evaluation 14.6 Extension 14.7 Conclusion References
Chapter 15: Data Security and Privacy in Cyber-Physical Systems for Healthcare
15.1 Introduction 15.2 Medical Cyber-Physical Systems 15.3 Data Security and Privacy Issues and Challenges in WBANs 15.4 Existing Security and Privacy Solutions in WBAN 15.5 Conclusion References
Chapter 16: Cyber Security of Smart Buildings
16.1 What Is a Smart Building? 16.2 Communication Protocols for Smart Buildings 16.3 Attacks 16.4 Solutions to Protect Smart Buildings 16.5 Recent Trends in Smart Building Security Research 16.6 Conclusion and Outlook References
Chapter 17: The Internet of Postal Things: Making the Postal Infrastructure Smarter
17.1 Introduction 17.2 Scoping the Internet of Postal Things 17.3 Identifying Internet of Postal Things Applications 17.4 The Future of IoPT 17.5 Conclusion References
Chapter 18: Security and Privacy Issues in the Internet of Cows
18.1 Precision Livestock Farming 18.2 Security and Privacy of IoT in Agriculture 18.3 Conclusion References
Chapter 19: Admission Control-Based Load Protection in the Smart Grid
19.1 Introduction 19.2 Related Work 19.3 Our Approach 19.4 Performance Evaluation 19.5 Conclusion References
Editor Biographies Index End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion