TY - BOOK AU - Mitton,Nathalie AU - Chaouchi,Hakima AU - Noel,Thomas AU - Watteyne,Thomas AU - Gabillon,Alban AU - Capolsini,Patrick ED - SpringerLink (Online service) TI - Interoperability, Safety and Security in IoT: Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers T2 - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, SN - 9783319527277 AV - TK5105.5-5105.9 U1 - 004.6 23 PY - 2017/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Computer communication systems KW - Application software KW - Data protection KW - Software engineering KW - Special purpose computers KW - Computer security KW - Computer Communication Networks KW - Information Systems Applications (incl. Internet) KW - Security KW - Software Engineering KW - Special Purpose and Application-Based Systems KW - Systems and Data Security N1 - Comparative Analysis of Opportunistic Communication Technologies -- Technical Overview of F-Interop -- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs -- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT -- Providing Interoperability for Autonomic Control of Connected Devices -- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications -- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things -- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT -- On the Performance of Key Pre-distribution for RPL-based IoT Networks -- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things -- Framework of Cyber Attack Attribution Based on Threat Intelligence -- UML Modeling of Cross-layer Attack in Wireless Sensor Networks -- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications -- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT -- Framework of Cyber Attack Attribution Based on Threat Intelligence; Available to subscribing member institutions only. Доступно лише організаціям членам підписки N2 - This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT) UR - https://doi.org/10.1007/978-3-319-52727-7 ER -