|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_on1328126166 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
220611s2022 njua ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|c YDX
|d YDXIT
|d DG1
|d OCLCF
|d ORMDA
|d UKAHL
|d N$T
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781119836636
|q (electronic bk. : oBook)
|
020 |
|
|
|a 1119836638
|q (electronic bk. : oBook)
|
020 |
|
|
|a 9781119836629
|q electronic book
|
020 |
|
|
|a 111983662X
|q electronic book
|
020 |
|
|
|a 9781119836612
|q (electronic bk.)
|
020 |
|
|
|a 1119836611
|q (electronic bk.)
|
020 |
|
|
|z 1119836190
|
020 |
|
|
|z 9781119836193
|
024 |
7 |
|
|a 10.1002/9781119836636
|2 doi
|
029 |
1 |
|
|a AU@
|b 000072428061
|
035 |
|
|
|a (OCoLC)1328126166
|
037 |
|
|
|a 9781119836193
|b O'Reilly Media
|
050 |
|
4 |
|a TJ213
|b .C93 2022
|
082 |
0 |
4 |
|a 006.2/2
|2 23/eng/20220809
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cyber-physical systems :
|b foundations and techniques /
|c edited by Uzzal Sharma [and five others].
|
264 |
|
1 |
|a Hoboken, NJ :
|b John Wiley & Sons, Inc. ;
|a Beverly, MA :
|b Scrivener Publishing LLC,
|c 2022.
|
300 |
|
|
|a 1 online resource (xix, 315 pages) :
|b illustrations (chiefly color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Preface -- Acknowledgement -- 1 A Systematic Literature Review on Cyber Security Threats of Industrial Internet of Things 1 Ravi Gedam and Surendra Rahamatkar -- 1.1 Introduction -- 1.2 Background of Industrial Internet of Things -- 1.3 Literature Review -- 1.4 The Proposed Methodology -- 1.5 Experimental Requirements -- 1.6 Conclusion -- 2 Integration of Big Data Analytics Into Cyber-Physical Systems 19 Nandhini R.S. and Ramanathan -- 2.1 Introduction -- 2.2 Big Data Model for Cyber-Physical System -- 2.3 Big Data and Cyber-Physical System Integration -- 2.4 Storage and Communication of Big Data for Cyber-Physical System -- 2.5 Big Data Processing in Cyber-Physical System -- 2.6 Applications of Big Data for Cyber-Physical System -- 2.7 Security and Privacy -- 2.8 Conclusion -- 3 Machine Learning: A Key Towards Smart Cyber-Physical Systems 43 Rashmi Kapoor, Chandragiri Radhacharan and Sung-ho Hur -- 3.1 Introduction -- 3.2 Different Machine Learning Algorithms -- 3.3 ML Use-Case in MATLAB -- 3.4 ML Use-Case in Python -- 3.5 Conclusion -- 4 Precise Risk Assessment and Management 63 Ambika N. -- 4.1 Introduction -- 4.2 Need for Security -- 4.3 Different Kinds of Attacks -- 4.4 Literature Survey -- 4.5 Proposed Work -- 4.6 Conclusion -- 5 A Detailed Review on Security Issues in Layered Architectures and Distributed Denial Service of Attacks Over IoT Environment 85 Rajarajan Ganesarathinam, Muthukumaran Singaraveluand K.N. Padma Pooja -- 5.1 Introduction -- 5.2 IoT Components, Layered Architectures, Security Threats -- 5.3 Taxonomy of DDoS Attacks and Its Working Mechanism in IoT -- 5.4 Existing Solution Mechanisms Against DDoS Over IoT -- 5.5 Challenges and Research Directions -- 5.6 Conclusion -- 6 Machine Learning and Deep Learning Techniques for Phishing Threats and Challenges 123 Bhimavarapu Usharani -- 6.1 Introduction -- 6.2 Phishing Threats -- 6.3 Deep Learning Architectures -- 6.4 Related Work -- 6.5 Analysis Report -- 6.6 Current Challenges -- 6.7 Conclusions -- 7 Novel Defending and Prevention Technique for Man-in-the-Middle Attacks in Cyber-Physical Networks 147 Gaurav Narula, Preeti Nagrath, Drishti Hans and Anand Nayyar -- 7.1 Introduction -- 7.2 Literature Review -- 7.3 Classification of Attacks -- 7.4 Proposed Algorithm of Detection and Prevention -- 7.5 Results and Discussion -- 7.6 Conclusion and Future Scope -- 8 Fourth Order Interleaved Boost Converter With PID, Type II and Type III Controllers for Smart Grid Applications 179 Saurav S. and Arnab Ghosh -- 8.1 Introduction -- 8.2 Modeling of Fourth Order Interleaved Boost Converter -- 8.3 Controller Design for FIBC -- 8.4 Computational Results -- 8.5 Conclusion -- 9 Industry 4.0 in Healthcare IoT for Inventory and Supply Chain Management 209 Somya Goyal -- 9.1 Introduction -- 9.2 Benefits and Barriers in Implementation of RFID -- 9.3 IoT-Based Inventory Management--Case Studies -- 9.4 Proposed Model for RFID-Based Hospital Management -- 9.5 Conclusion and Future Scope -- 10 A Systematic Study of Security of Industrial IoT 229 Ravi Gedam and Surendra Rahamatkar -- 10.1 Introduction -- 10.2 Overview of Industrial Internet of Things (Smart Manufacturing) -- 10.3 Industrial Reference Architecture -- 10.4 FIWARE Generic Enabler (FIWARE GE) -- 10.5 Discussion -- 10.6 Conclusion -- 11 Investigation of Holistic Approaches for Privacy Aware Design of Cyber-Physical Systems 257 Manas Kumar Yogi, A.S.N. Chakravarthy and Jyotir Moy Chatterjee -- 11.1 Introduction -- 11.2 Popular Privacy Design Recommendations -- 11.3 Current Privacy Challenges in CPS -- 11.4 Privacy Aware Design for CPS -- 11.5 Limitations -- 11.6 Converting Risks of Applying AI Into Advantages -- 11.7 Conclusion and Future Scope -- 12 Exposing Security and Privacy Issues on Cyber-Physical Systems 273 Keshav Kaushik -- 12.1 Introduction to Cyber-Physical Systems (CPS) -- 12.2 Cyber-Attacks and Security in CPS -- 12.3 Privacy in CPS -- 12.4 Conclusion & Future Trends in CPS Security -- 13 Applications of Cyber-Physical Systems 289 Amandeep Kaur and Jyotir Moy Chatterjee -- 13.1 Introduction -- 13.2 Applications of Cyber-Physical Systems -- 13.3 Conclusion -- References -- Index.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on August 09, 2022).
|
520 |
|
|
|a CYBER-PHYSICAL SYSTEMS The 13 chapters in this book cover the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement of existing technology such as machine learning, big data and robotics. Cyber-Physical Systems (CPS) is the interconnection of the virtual or cyber and the physical system. It is realized by combining three well-known technologies, namely "Embedded Systems," "Sensors and Actuators," and "Network and Communication Systems." These technologies combine to form a system known as CPS. In CPS, the physical process and information processing are so tightly connected that it is hard to distinguish the individual contribution of each process from the output. Some exciting innovations such as autonomous cars, quadcopter, spaceships, sophisticated medical devices fall under CPS. The scope of CPS is tremendous. In CPS, one sees the applications of various emerging technologies such as artificial intelligence (AI), Internet of Things (IoT), machine learning (ML), deep learning (DL), big data (BD), robotics, quantum technology, etc. In almost all sectors, whether it is education, health, human resource development, skill improvement, startup strategy, etc., one sees an enhancement in the quality of output because of the emergence of CPS into the field. Audience Researchers in Information technology, artificial intelligence, robotics, electronics and electrical engineering.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cooperating objects (Computer systems)
|
650 |
|
6 |
|a Objets coopérants (Systèmes informatiques)
|
650 |
|
7 |
|a Cooperating objects (Computer systems)
|2 fast
|
700 |
1 |
|
|a Sharma, Uzzal,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|z 1119836190
|z 9781119836193
|w (OCoLC)1251765498
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119836193/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40351120
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40363697
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302955476
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3304604
|
994 |
|
|
|a 92
|b IZTAP
|