서브메뉴
검색
상세정보
An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Prediction- [electronic resource]
An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Prediction- [electronic resource]
상세정보
- 자료유형
- 학위논문(국외)
- 자관 청구기호
- 기본표목-개인명
- 표제와 책임표시사항
- An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Prediction - [electronic resource] / Buduru, Arun Balaji.
- 발행, 배포, 간사 사항
- 형태사항
- 1 online resource(94 p)
- 일반주기
- Source: Dissertation Abstracts International, Volume: 78-06(E), Section: B.
- 일반주기
- Adviser: Sik-Sang Yau.
- 학위논문주기
- Thesis (Ph.D.)--Arizona State University, 2016.
- 요약 등 주기
- 요약Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made cyber systems omnipotent, and control many aspects of human lives. Emerging trends in successful cyber system breaches have shown increasing sophistication in attacks and that attackers are no longer limited by resources, including human and computing power. Most existing cyber defense systems for IoT systems have two major issues: (1) they do not incorporate human user behavior(s) and preferences in their approaches, and (2) they do not continuously learn from dynamic environment and effectively adapt to thwart sophisticated cyber-attacks. Consequently, the security solutions generated may not be usable or implementable by the user(s) thereby drastically reducing the effectiveness of these security solutions.
- 요약 등 주기
- 요약In order to address these major issues, a comprehensive approach to securing ubiquitous smart devices in IoT environment by incorporating probabilistic human user behavioral inputs is presented. The approach will include techniques to (1) protect the controller device(s) [smart phone or tablet] by continuously learning and authenticating the legitimate user based on the touch screen finger gestures in the background, without requiring users' to provide their finger gesture inputs intentionally for training purposes, and (2) efficiently configure IoT devices through controller device(s), in conformance with the probabilistic human user behavior(s) and preferences, to effectively adapt IoT devices to the changing environment. The effectiveness of the approach will be demonstrated with experiments that are based on collected user behavioral data and simulations.
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 부출표목-단체명
- 기본자료저록
- Dissertation Abstracts International. 78-06B(E).
- 기본자료저록
- Dissertation Abstract International
- 전자적 위치 및 접속
- 원문정보보기
- 소장사항
-
20170404 2017
MARC
008170601s2016 us esm 001c eng■001MOKWON01254541
■00520170418120523
■007cr
■020 ▼a9781369406795
■035 ▼a(MiAaPQ)AAI10245321
■040 ▼aMiAaPQ▼cMiAaPQ
■090 ▼a전자도서(박사논문)
■1001 ▼aBuduru, Arun Balaji.
■24513▼aAn Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Prediction▼h[electronic resource]▼cBuduru, Arun Balaji.
■260 ▼a[Sl]▼bArizona State University▼c2016
■300 ▼a1 online resource(94 p)
■500 ▼aSource: Dissertation Abstracts International, Volume: 78-06(E), Section: B.
■500 ▼aAdviser: Sik-Sang Yau.
■5021 ▼aThesis (Ph.D.)--Arizona State University, 2016.
■520 ▼aCyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made cyber systems omnipotent, and control many aspects of human lives. Emerging trends in successful cyber system breaches have shown increasing sophistication in attacks and that attackers are no longer limited by resources, including human and computing power. Most existing cyber defense systems for IoT systems have two major issues: (1) they do not incorporate human user behavior(s) and preferences in their approaches, and (2) they do not continuously learn from dynamic environment and effectively adapt to thwart sophisticated cyber-attacks. Consequently, the security solutions generated may not be usable or implementable by the user(s) thereby drastically reducing the effectiveness of these security solutions.
■520 ▼aIn order to address these major issues, a comprehensive approach to securing ubiquitous smart devices in IoT environment by incorporating probabilistic human user behavioral inputs is presented. The approach will include techniques to (1) protect the controller device(s) [smart phone or tablet] by continuously learning and authenticating the legitimate user based on the touch screen finger gestures in the background, without requiring users' to provide their finger gesture inputs intentionally for training purposes, and (2) efficiently configure IoT devices through controller device(s), in conformance with the probabilistic human user behavior(s) and preferences, to effectively adapt IoT devices to the changing environment. The effectiveness of the approach will be demonstrated with experiments that are based on collected user behavioral data and simulations.
■590 ▼aSchool code: 0010.
■650 4▼aComputer science
■650 4▼aWeb studies
■650 4▼aInformation technology
■690 ▼a0984
■690 ▼a0646
■690 ▼a0489
■71020▼aArizona State University▼bComputer Science.
■7730 ▼tDissertation Abstracts International▼g78-06B(E).
■773 ▼tDissertation Abstract International
■790 ▼a0010
■791 ▼aPh.D.
■792 ▼a2016
■793 ▼aEnglish
■85640▼uhttp://www.riss.kr/pdu/ddodLink.do?id=T14490292▼nKERIS▼z이 자료의 원문은 한국교육학술정보원에서 제공합니다.
■980 ▼a20170404▼f2017



한글
ENG
日本
中文
Việt Nam