Back to Search

IoT Security using KVS Approach

AUTHOR Kazi, Kutubuddin Sayyad Liyakat
PUBLISHER LAP Lambert Academic Publishing (06/06/2025)
PRODUCT TYPE Paperback (Paperback)

Description
In the realm of IoT security, the KVS Approach, a B cell concept, inspired by the human immune system, offers a novel approach to threat detection and mitigation. Just as B cells in the body recognize and neutralize specific pathogens, this KVS Approach, bio-inspired model utilizes a network of "digital B cells" to identify and respond to malicious activities targeting IoT devices and networks. These digital B cells are trained on normal network behavior and device profiles, enabling them to detect deviations that signify potential attacks. KVS (Kutubuddin, Vahida, Sultana) Approach proves particularly valuable in the dynamic and resource-constrained environment of IoT, where traditional security measures may be insufficient to address the evolving threat landscape.
Show More
Product Format
Product Details
ISBN-13: 9786208449643
ISBN-10: 6208449642
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 80
Carton Quantity: 88
Product Dimensions: 6.00 x 0.19 x 9.00 inches
Weight: 0.26 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Technology & Engineering | Electronics - General
Descriptions, Reviews, Etc.
publisher marketing
In the realm of IoT security, the KVS Approach, a B cell concept, inspired by the human immune system, offers a novel approach to threat detection and mitigation. Just as B cells in the body recognize and neutralize specific pathogens, this KVS Approach, bio-inspired model utilizes a network of "digital B cells" to identify and respond to malicious activities targeting IoT devices and networks. These digital B cells are trained on normal network behavior and device profiles, enabling them to detect deviations that signify potential attacks. KVS (Kutubuddin, Vahida, Sultana) Approach proves particularly valuable in the dynamic and resource-constrained environment of IoT, where traditional security measures may be insufficient to address the evolving threat landscape.
Show More
Your Price  $60.56
Paperback