Security systems have become an integral part of the building and large complex setups and intervention of Computational Intelligence (CI) paradigm plays an important role in security system architecture. The book covers both theoretical contributions and practical applications in security system design by applying Internet of Things and CI.
Security systems have become an integral part of the building and large complex setups and intervention of Computational Intelligence (CI) paradigm plays an important role in security system architecture. The book covers both theoretical contributions and practical applications in security system design by applying Internet of Things and CI.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Uzzal Sharma is currently an Assistant Professor (Selection Grade), Department of Computer Applications, School of Technology, Assam Don Bosco University, Guwahati, India. Parmanand Astya, PhD, is affiliated with Sharda University, Greater Noida, U. P., India. Anupam Baliyan is working as a Professor at University Institute of Engineering & Technology, Chitkara University, Punjab. Salah-ddine Krit is an Associate Professor at the Polydisciplinary Faculty of Ouarzazate, Ibn Zohr University Agadir Morocco, Dr. Krit is currently The Director of Engineering Science and Energies Laboratory and The Chief of Department of Mathematics, Informatics and Management. Vishal Jain, PhD, is presently working as an Associate Professor at the Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida, U. P., India. Mohammad Zubair Khan is currently an Associate Professor with the Department of Computer Science, Taibah University.
Inhaltsangabe
1. Analysis of Various Security Defence Frameworks in Different Application Areas of Cyber-Physical System. 2. Role and Development of Security Architecture and Models in Software Systems. 3. Role of IoT in the Design of a Security System. 4. IoT-Tangle Enhanced Security Systems. 5. Recent Trends in 5G and Machine Learning, Challenges and Opportunities. 6. Hardware Trojans in Microfluidic Biochips: Principles and Practice. 7. Benefits & Risks of Cloud Computing. 8. Intrusion Detection Systems for Trending Cyber-Attacks. 9. War of Control Hijacking: Attacks and Defenses. 10. IOT Based Lightweight Cryptographic Schemes.
1. Analysis of Various Security Defence Frameworks in Different Application Areas of Cyber-Physical System. 2. Role and Development of Security Architecture and Models in Software Systems. 3. Role of IoT in the Design of a Security System. 4. IoT-Tangle Enhanced Security Systems. 5. Recent Trends in 5G and Machine Learning, Challenges and Opportunities. 6. Hardware Trojans in Microfluidic Biochips: Principles and Practice. 7. Benefits & Risks of Cloud Computing. 8. Intrusion Detection Systems for Trending Cyber-Attacks. 9. War of Control Hijacking: Attacks and Defenses. 10. IOT Based Lightweight Cryptographic Schemes.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497