Books on the topic 'Security of IoT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security of IoT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Chaki, Rituparna, and Debdutta Barman Roy. Security in IoT. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003149507.
Full textNayak, Padmalaya, Niranjan Ray, and P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.
Full textHancke, Gerhard P., and Konstantinos Markantonakis, eds. Radio Frequency Identification and IoT Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62024-4.
Full textMitton, Nathalie, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, and Patrick Capolsini, eds. Interoperability, Safety and Security in IoT. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52727-7.
Full textFortino, Giancarlo, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi, and Alban Gabillon, eds. Interoperability, Safety and Security in IoT. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93797-7.
Full textDehghantanha, Ali, and Kim-Kwang Raymond Choo, eds. Handbook of Big Data and IoT Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10543-3.
Full textJeyanthi, N., Ajith Abraham, and Hamid Mcheick, eds. Ubiquitous Computing and Computing Security of IoT. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-01566-4.
Full textAzrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Said Benkirane. Blockchain and Machine Learning for IoT Security. New York: Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003438779.
Full textPrasad, Ajay, Thipendra P. Singh, and Samidha Dwivedi Sharma, eds. Communication Technologies and Security Challenges in IoT. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0052-3.
Full textJiang, Hongbo, Hongyi Wu, and Fanzi Zeng, eds. Edge Computing and IoT: Systems, Management and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73429-9.
Full textAbdel-Basset, Mohamed, Nour Moustafa, Hossam Hawash, and Weiping Ding. Deep Learning Techniques for IoT Security and Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89025-4.
Full textKieras, Timothy, Junaid Farooq, and Quanyan Zhu. IoT Supply Chain Security Risk Analysis and Mitigation. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08480-5.
Full textMahmood, Zaigham, ed. Security, Privacy and Trust in the IoT Environment. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18075-1.
Full textXiao, Zhu, Ping Zhao, Xingxia Dai, and Jinmei Shu, eds. Edge Computing and IoT: Systems, Management and Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28990-3.
Full textAgrawal, Rajeev, Pabitra Mitra, Arindam Pal, and Madhu Sharma Gaur, eds. International Conference on IoT, Intelligent Computing and Security. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-8136-4.
Full textMishra, Anurag, Deepak Gupta, and Girija Chetty, eds. Advances in IoT and Security with Computational Intelligence. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-5088-1.
Full textMishra, Anurag, Deepak Gupta, and Girija Chetty, eds. Advances in IoT and Security with Computational Intelligence. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-5085-0.
Full textAbd El-Latif, Ahmed A., Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, and Brij B. Gupta, eds. Security and Privacy Preserving for IoT and 5G Networks. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-85428-7.
Full textLiyanage, Madhusanka, An Braeken, Pardeep Kumar, and Mika Ylianttila, eds. IoT Security. Wiley, 2019. http://dx.doi.org/10.1002/9781119527978.
Full textGilchrist, Alasdair. IoT Security Issues. De Gruyter, Inc., 2017.
Find full textGilchrist, Alasdair. IoT Security Issues. De Gruyter, Inc., 2017.
Find full textGilchrist, Alasdair. IoT Security Issues. De Gruyter, Inc., 2017.
Find full textSecurity in Iot. Taylor & Francis Group, 2022.
Find full textChaki, Rituparna, and Debdutta Barman Roy. Security in IoT. CRC Press LLC, 2021.
Find full textSecurity in IoT-Enabled Spaces. Taylor & Francis Group, 2019.
Find full textKumar, Pardeep, Madhusanka Liyanage, Mika Ylianttila, and An Braeken. IoT Security: Advances in Authentication. Wiley & Sons, Limited, John, 2019.
Find full textSecurity in IoT Social Networks. Elsevier, 2021. http://dx.doi.org/10.1016/c2019-0-03214-1.
Full textPatel, Harshita, and Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Find full textKumar, Pardeep, Madhusanka Liyanage, Mika Ylianttila, and An Braeken. IoT Security: Advances in Authentication. Wiley & Sons, Incorporated, John, 2019.
Find full textLe, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Find full textAl-Turjman, Fadi. Security in Iot-Enabled Spaces. Taylor & Francis Group, 2020.
Find full textAl-Turjman, Fadi. Security in Iot-Enabled Spaces. Taylor & Francis Group, 2019.
Find full textAl-Turjman, Fadi, and B. D. Deebak. Security in IoT Social Networks. Elsevier Science & Technology Books, 2020.
Find full textLe, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Find full textIoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Find full textLe, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Find full textPatel, Harshita, and Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Find full textAl-Turjman, Fadi. Security in IoT-Enabled Spaces. Taylor & Francis Group, 2019.
Find full textKumar, Pardeep, Madhusanka Liyanage, Mika Ylianttila, and An Braeken. IoT Security: Advances in Authentication. Wiley & Sons, Limited, John, 2020.
Find full textAl-Turjman, Fadi, and B. D. Deebak. Security in IoT Social Networks. Elsevier Science & Technology, 2020.
Find full textPatel, Harshita, and Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Find full textBhushan, Bharat, Narayan C. Debnath, and Sudhir Kumar Sharma. Iot Security Paradigms and Applications. Taylor & Francis Group, 2020.
Find full textKumar, Pardeep, Madhusanka Liyanage, Mika Ylianttila, and An Braeken. IoT Security: Advances in Authentication. Wiley & Sons, Incorporated, John, 2019.
Find full textAl-Turjman, Fadi. Security in IoT-Enabled Spaces. Taylor & Francis Group, 2019.
Find full textAl-Turjman, Fadi. Security in IoT-Enabled Spaces. Taylor & Francis Group, 2019.
Find full textLe, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Find full textPatel, Harshita, and Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Find full textDhondge, Kaustubh. Lifecycle IoT Security for Engineers. Artech House, 2021.
Find full textPatel, Harshita, and Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Find full textChaki, Rituparna, and Debdutta Barman Roy. Security in IoT: The Changing Perspective. Taylor & Francis Group, 2022.
Find full text