Buch, Englisch, Band 95, 278 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 446 g
Reihe: Studies in Big Data
Techniques, Challenges, and New Directions
Buch, Englisch, Band 95, 278 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 446 g
Reihe: Studies in Big Data
ISBN: 978-3-030-85430-0
Verlag: Springer International Publishing
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications
It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Technik Allgemein Computeranwendungen in der Technik
- Technische Wissenschaften Energietechnik | Elektrotechnik Elektrotechnik
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Computeranwendungen in Wissenschaft & Technologie
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Big Data
Weitere Infos & Material
Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks.- Data Security Challenges in Deep Neural Network for Healthcare IoT Systems.- Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio.- A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals.- Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems.- Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches.