본문

서브메뉴

상세정보

An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Prediction- [electronic resource]
An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabil...
An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Prediction- [electronic resource]

상세정보

자료유형  
 학위논문(국외)
자관 청구기호  
기본표목-개인명  
표제와 책임표시사항  
An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Prediction - [electronic resource] / Buduru, Arun Balaji.
발행, 배포, 간사 사항  
[Sl] : Arizona State University , 2016
    형태사항  
    1 online resource(94 p)
    일반주기  
    Source: Dissertation Abstracts International, Volume: 78-06(E), Section: B.
    일반주기  
    Adviser: Sik-Sang Yau.
    학위논문주기  
    Thesis (Ph.D.)--Arizona State University, 2016.
    요약 등 주기  
    요약Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made cyber systems omnipotent, and control many aspects of human lives. Emerging trends in successful cyber system breaches have shown increasing sophistication in attacks and that attackers are no longer limited by resources, including human and computing power. Most existing cyber defense systems for IoT systems have two major issues: (1) they do not incorporate human user behavior(s) and preferences in their approaches, and (2) they do not continuously learn from dynamic environment and effectively adapt to thwart sophisticated cyber-attacks. Consequently, the security solutions generated may not be usable or implementable by the user(s) thereby drastically reducing the effectiveness of these security solutions.
    요약 등 주기  
    요약In order to address these major issues, a comprehensive approach to securing ubiquitous smart devices in IoT environment by incorporating probabilistic human user behavioral inputs is presented. The approach will include techniques to (1) protect the controller device(s) [smart phone or tablet] by continuously learning and authenticating the legitimate user based on the touch screen finger gestures in the background, without requiring users' to provide their finger gesture inputs intentionally for training purposes, and (2) efficiently configure IoT devices through controller device(s), in conformance with the probabilistic human user behavior(s) and preferences, to effectively adapt IoT devices to the changing environment. The effectiveness of the approach will be demonstrated with experiments that are based on collected user behavioral data and simulations.
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    부출표목-단체명  
    Arizona State University Computer Science
      기본자료저록  
      Dissertation Abstracts International. 78-06B(E).
      기본자료저록  
      Dissertation Abstract International
      전자적 위치 및 접속  
       원문정보보기
      소장사항  
      20170404 2017

      MARC

       008170601s2016        us          esm        001c    eng
      ■001MOKWON01254541
      ■00520170418120523
      ■007cr
      ■020    ▼a9781369406795
      ■035    ▼a(MiAaPQ)AAI10245321
      ■040    ▼aMiAaPQ▼cMiAaPQ
      ■090    ▼a전자도서(박사논문)
      ■1001  ▼aBuduru,  Arun  Balaji.
      ■24513▼aAn  Adaptive  Approach  to  Securing  Ubiquitous  Smart  Devices  in  IoT  Environment  with  Probabilistic  User  Behavior  Prediction▼h[electronic  resource]▼cBuduru,  Arun  Balaji.
      ■260    ▼a[Sl]▼bArizona  State  University▼c2016
      ■300    ▼a1  online  resource(94  p)
      ■500    ▼aSource:  Dissertation  Abstracts  International,  Volume:  78-06(E),  Section:  B.
      ■500    ▼aAdviser:  Sik-Sang  Yau.
      ■5021  ▼aThesis  (Ph.D.)--Arizona  State  University,  2016.
      ■520    ▼aCyber  systems,  including  IoT  (Internet  of  Things),  are  increasingly  being  used  ubiquitously  to  vastly  improve  the  efficiency  and  reduce  the  cost  of  critical  application  areas,  such  as  finance,  transportation,  defense,  and  healthcare.  Over  the  past  two  decades,  computing  efficiency  and  hardware  cost  have  dramatically  been  improved.  These  improvements  have  made  cyber  systems  omnipotent,  and  control  many  aspects  of  human  lives.  Emerging  trends  in  successful  cyber  system  breaches  have  shown  increasing  sophistication  in  attacks  and  that  attackers  are  no  longer  limited  by  resources,  including  human  and  computing  power.  Most  existing  cyber  defense  systems  for  IoT  systems  have  two  major  issues:  (1)  they  do  not  incorporate  human  user  behavior(s)  and  preferences  in  their  approaches,  and  (2)  they  do  not  continuously  learn  from  dynamic  environment  and  effectively  adapt  to  thwart  sophisticated  cyber-attacks.  Consequently,  the  security  solutions  generated  may  not  be  usable  or  implementable  by  the  user(s)  thereby  drastically  reducing  the  effectiveness  of  these  security  solutions.
      ■520    ▼aIn  order  to  address  these  major  issues,  a  comprehensive  approach  to  securing  ubiquitous  smart  devices  in  IoT  environment  by  incorporating  probabilistic  human  user  behavioral  inputs  is  presented.  The  approach  will  include  techniques  to  (1)  protect  the  controller  device(s)  [smart  phone  or  tablet]  by  continuously  learning  and  authenticating  the  legitimate  user  based  on  the  touch  screen  finger  gestures  in  the  background,  without  requiring  users'  to  provide  their  finger  gesture  inputs  intentionally  for  training  purposes,  and  (2)  efficiently  configure  IoT  devices  through  controller  device(s),  in  conformance  with  the  probabilistic  human  user  behavior(s)  and  preferences,  to  effectively  adapt  IoT  devices  to  the  changing  environment.  The  effectiveness  of  the  approach  will  be  demonstrated  with  experiments  that  are  based  on  collected  user  behavioral  data  and  simulations.
      ■590    ▼aSchool  code:  0010.
      ■650  4▼aComputer  science
      ■650  4▼aWeb  studies
      ■650  4▼aInformation  technology
      ■690    ▼a0984
      ■690    ▼a0646
      ■690    ▼a0489
      ■71020▼aArizona  State  University▼bComputer  Science.
      ■7730  ▼tDissertation  Abstracts  International▼g78-06B(E).
      ■773    ▼tDissertation  Abstract  International
      ■790    ▼a0010
      ■791    ▼aPh.D.
      ■792    ▼a2016
      ■793    ▼aEnglish
      ■85640▼uhttp://www.riss.kr/pdu/ddodLink.do?id=T14490292▼nKERIS▼z이  자료의  원문은  한국교육학술정보원에서  제공합니다.
      ■980    ▼a20170404▼f2017

      미리보기

      내보내기

      chatGPT토론

      Ai 추천 관련 도서


        신착도서 더보기
        관련도서 더보기
        최근 3년간 통계입니다.
        SMS 발송 간략정보 이동 상세정보출력

        소장정보

        • 예약
        • 서가에 없는 책 신고
        • 자료배달서비스
        • 나의폴더
        • 우선정리요청
        소장자료
        등록번호 청구기호 소장처 대출가능여부 대출정보
        EM090295 TD  전자도서(박사논문) 연속간행물실(2층) 온라인이용가능 온라인이용가능
        마이폴더

        * 대출중인 자료에 한하여 예약이 가능합니다. 예약을 원하시면 예약버튼을 클릭하십시오.

        해당 도서를 다른 이용자가 함께 대출한 도서

        관련도서

        관련 인기도서

        서평쓰기

        도서위치

        AiBot !!
        CH