Читать книгу Cybersecurity in Smart Homes - Rida Khatoun - Страница 3

List of Tables

Оглавление

1 Chapter 1Table 1.1. Comparison between MQTT and CoAPTable 1.2. Rule automation for available log typesTable 1.3. Automation test procedure

2 Chapter 2Table 2.1. Summary of security threats and challenges for a smart homeTable 2.2. Summary of protocols across different IoT layers (Kalla et al. 2020)Table 2.3. Matrix of security architectures and security goals (Authentication (...Table 2.4. Stages of defining an authentication protocol for IoT (Ferrag et al. ...Table 2.5. IoT authentication schemes (El-Hajj et al. 2019)Table 2.6. Examples of smart home authentication proposalsTable 2.7. Examples of mutual authentication schemes

3 Chapter 3Table 3.1. The Algorithm #1 maximum intra Hamming distance and inter Hamming dis...Table 3.2. The Algorithm #2 maximum intra Hamming distance and inter Hamming dis...Table 3.3. The Algorithm #3 maximum intra Hamming distance and inter Hamming dis...

4 Chapter 5Table 5.1. Overview of selected IoT operating Systems (OS)

5 Chapter 6Table 6.1. Layers of IoTTable 6.2. Description of different neural network algorithms

6 Chapter 7Table 7.1. sTiki size according to size utility [Byte]

Cybersecurity in Smart Homes

Подняться наверх