IoT Security Paradigms and Applications (eBook, PDF)
Research and Practices
Redaktion: Sharma, Sudhir Kumar; Debnath, Narayan C.; Bhushan, Bharat
57,95 €
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
57,95 €
Als Download kaufen
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
29 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
29 °P sammeln
IoT Security Paradigms and Applications (eBook, PDF)
Research and Practices
Redaktion: Sharma, Sudhir Kumar; Debnath, Narayan C.; Bhushan, Bharat
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Present book highlights these challenges and provide an integrating framework for these technologies illustrating role of blockchain in all the possible facets of IoT security. Further, it investigates the security and privacy issues associated with various IoT systems exploring various machine learning based IoT security solutions including 5G.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 10.89MB
Present book highlights these challenges and provide an integrating framework for these technologies illustrating role of blockchain in all the possible facets of IoT security. Further, it investigates the security and privacy issues associated with various IoT systems exploring various machine learning based IoT security solutions including 5G.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 352
- Erscheinungstermin: 7. Oktober 2020
- Englisch
- ISBN-13: 9781000172249
- Artikelnr.: 59981949
- Verlag: Taylor & Francis
- Seitenzahl: 352
- Erscheinungstermin: 7. Oktober 2020
- Englisch
- ISBN-13: 9781000172249
- Artikelnr.: 59981949
Sudhir Kumar Sharma is currently a Professor in the Department of Computer Science, Institute of Information Technology & Management affiliated to GGSIPU, New Delhi, India. He has extensive experience for over 19 years in the field of Computer Science and Engineering. He obtained his Ph.D. degree in Information Technology from USICT, GGSIPU, New Delhi, India. Dr. Sharma obtained his M. Tech degree in Computer Science & Engineering in 1999 from the Guru Jambheshwar University, Hisar, India and M.Sc. degree in Physics from the University of Roorkee (now IIT Roorkee), Roorkee, in 1997. His research interests include Machine Learning, Data Mining, and Security. He has published several research papers in various prestigious International Journals and International Conferences. He is a life member of CSI and IETE. Dr. Sharma is an Associate Editor of the International Journal of End-User Computing and Development (IJEUCD), IGI Global, USA. He is a convener of ICETIT-2019. Bharat Bhushan is an Assistant Professor of Computer Science and Engineering (CSE) at HMRITM, GGSIP university, New Delhi, India. Currently, he is also serving as a Managing Director, Gateville, Allahabad, U.P., India, and pursuing a PhD degree specializing in Wireless Sensor Nteworks at the Birla institute of technology, Mesra, India. He received his Undergraduate (BTech) degree in CSE with Distinction in 2012 and received his Masters (MTech) degree in Information Security with Distinction in 2015 from Birla Institute of Technology, Mesra, India. He earned numerous international certifications such as Cisco Certified Network Associate, Cisco certified network professional Trained, Cisco Certified Entry Networking Technician, Microsoft Certified Technology Specialist, Microsoft certified IT Professional, Red-hat Certified Engineer. He has Published more than 74 papers in different national and international conferences and journals including wireless personal communications (Springer) and wireless networks (springer). He was selected as a reviewer/Editorial Board Member for several reputed international journals. He also served as a speaker, Session Chair or Co-chair at various National and International Conferences. In the past, he worked as a Network Engineer for HCL Infosystems Ltd. He has qualified for four GATE exams (GATE 2013, 2014, 2015, and 2016) and gained several years of experience in imparting quality education to students. He is a member of IEEE. Narayan C. Debnath is currently the Founding Dean of the School of Computing and Information Technology at Eastern International University, Vietnam. He is also serving as the Head of the Department of Software Engineering at Eastern International University, Vietnam. Dr. Debnath has been the Director of the International Society for Computers and their Applications (ISCA) since 2014. Formerly, Dr. Debnath served as a Full Professor of Computer Science at Winona State University, Minnesota, USA for 28 years (1989-2017). He was elected as the Chairperson of the Computer Science Department at Winona State University for 3 consecutive terms and assumed the role of the Chairperson of the Computer Science Department at Winona State University for 7 years (2010-2017). Dr. Debnath earned a Doctor of Science (D.Sc.) degree in Computer Science and a Doctor of Philosophy (Ph.D.) degree in Physics. In the past, he served as the elected President for 2 separate terms, Vice President, and Conference Coordinator of the International Society for Computers and their Applications and has been a member of the ISCA Board of Directors since 2001. Before being elected as the Chairperson of the Department of Computer Science in 2010 at Winona State University, he served as the Acting Chairman of the Department. Dr. Debnath received numerous Honors and Awards while serving as a Professor of Computer Science during the period 1989 to 2017, including the Best Paper Award in the field of Networking at the 2008 IEEE International Symposium on Computers and Communications. During 1986-1989, Dr. Debnath served as an Assistant Professor of the Department of Mathematics and Computer Systems at the University of Wisconsin-River Falls, USA, where he was nominated for the National Science Foundation (NSF) Presidential Young Investigator Award in 1989. Professor Debnath has made significant contributions in teaching, research, and services across the academic and professional communities. He has made original research contributions in Software Engineering Models, Metrics and Tools, Software Testing, Software Management, and Information Science, Technology and Engineering. Dr. Debnath is an author or co-author of over 425 publications in numerous refereed journals and conference proceedings in Computer Science, Information Science, Information Technology, System Sciences, Mathematics, and Electrical Engineering.
Chapter 1 The Convergence of IoT with Big Data and Cloud Computing Chapter 2 Cybersecurity Management within the Internet of Things Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network Chapter 4 Machine Learning: Approach towards Security Chapter 5 Privacy Preservation with Machine Learning Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes Chapter 7 Intrusion Detection of SCADA System Using Machine Learning Techniques: A Study Chapter 8 Person Authentication Based on Biometric Traits Using Machine Learning Techniques Chapter 9 Data Security and Privacy through Text Steganography Approaches Chapter 10 IoT as a Means of Strengthening Individual Farmers' Position in Collaboration for Transformation to Sustainable Farming Chapter 11 Security in IoT HealthCare Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare Systems in Poland Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep Learning Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid ML Model and IoT Chapter 15 Securing Honey Supply Chain through Blockchain: An Implementation View
Chapter 1 The Convergence of IoT with Big Data and Cloud Computing Chapter 2 Cybersecurity Management within the Internet of Things Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network Chapter 4 Machine Learning: Approach towards Security Chapter 5 Privacy Preservation with Machine Learning Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes Chapter 7 Intrusion Detection of SCADA System Using Machine Learning Techniques: A Study Chapter 8 Person Authentication Based on Biometric Traits Using Machine Learning Techniques Chapter 9 Data Security and Privacy through Text Steganography Approaches Chapter 10 IoT as a Means of Strengthening Individual Farmers' Position in Collaboration for Transformation to Sustainable Farming Chapter 11 Security in IoT HealthCare Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare Systems in Poland Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep Learning Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid ML Model and IoT Chapter 15 Securing Honey Supply Chain through Blockchain: An Implementation View