IoT security paradigms and applications : research and practices
Bibliographische Detailangaben
- Titel
- IoT security paradigms and applications research and practices
- verantwortlich
- ; ;
- Ausgabe
- 1st
- veröffentlicht
- Erscheinungsjahr
- 2020
- Teil von
- Computational intelligence in engineering problem solving
- Medientyp
- E-Book
- Datenquelle
- British National Bibliography
- Tags
- Tag hinzufügen
Zugang
Für diesen Titel können wir derzeit leider keine weiteren Informationen zur Verfügbarkeit bereitstellen.
- Details Klicken Sie hier, um den Inhalt der Registerkarte zu laden.
- Standorte Klicken Sie hier, um den Inhalt der Registerkarte zu laden.
- Inhaltsangabe Klicken Sie hier, um den Inhalt der Registerkarte zu laden.
- Internformat Klicken Sie hier, um den Inhalt der Registerkarte zu laden.
Inhaltsangabe:
- <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I>