Interoperability, Safety and Security in IoT [electronic resource] : Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers / edited by Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini.
Вид матеріалу:
Текст Серія: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 190Публікація: Cham : Springer International Publishing : Imprint: Springer, 2017Видання: 1st ed. 2017Опис: X, 139 p. 46 illus. online resourceТип вмісту: - text
- computer
- online resource
- 9783319527277
- Computer communication systems
- Application software
- Data protection
- Software engineering
- Special purpose computers
- Computer security
- Computer Communication Networks
- Information Systems Applications (incl. Internet)
- Security
- Software Engineering
- Special Purpose and Application-Based Systems
- Systems and Data Security
- 004.6 23
- TK5105.5-5105.9
ЕКнига
Списки з цим бібзаписом:
Springer Ebooks (till 2020 - Open Access)+(2017 Network Access))
|
Springer Ebooks (2017 Network Access))
Comparative Analysis of Opportunistic Communication Technologies -- Technical Overview of F-Interop -- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs -- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT -- Providing Interoperability for Autonomic Control of Connected Devices -- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications -- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things -- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT -- On the Performance of Key Pre-distribution for RPL-based IoT Networks -- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things -- Framework of Cyber Attack Attribution Based on Threat Intelligence -- UML Modeling of Cross-layer Attack in Wireless Sensor Networks -- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications -- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT -- Framework of Cyber Attack Attribution Based on Threat Intelligence.
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
Available to subscribing member institutions only. Доступно лише організаціям членам підписки.
Online access from local network of NaUOA.
Online access with authorization at https://link.springer.com/
Онлайн-доступ з локальної мережі НаУОА.
Онлайн доступ з авторизацією на https://link.springer.com/
Немає коментарів для цієї одиниці.