IoT security paradigms and applications : research and practices

Bibliographische Detailangaben

Titel
IoT security paradigms and applications research and practices
verantwortlich
Sharma, Sudhir Kumar (HerausgeberIn); Bhushan, Bharat (Software specialist) (HerausgeberIn); Debnath, N. C. (HerausgeberIn)
Ausgabe
1st
veröffentlicht
Boca Raton: CRC Press, 2020
Erscheinungsjahr
2020
Teil von
Computational intelligence in engineering problem solving
Medientyp
E-Book
Datenquelle
British National Bibliography
Tags
Tag hinzufügen

Zugang

Für diesen Titel können wir derzeit leider keine weiteren Informationen zur Verfügbarkeit bereitstellen.

Inhaltsangabe:
  • <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I>