|
Books > Computing & IT > Internet > General
Security in IoT Social Networks takes a deep dive into security
threats and risks, focusing on real-world social and financial
effects. Mining and analyzing enormously vast networks is a vital
part of exploiting Big Data. This book provides insight into the
technological aspects of modeling, searching, and mining for
corresponding research issues, as well as designing and analyzing
models for resolving such challenges. The book will help start-ups
grow, providing research directions concerning security mechanisms
and protocols for social information networks. The book covers
structural analysis of large social information networks,
elucidating models and algorithms and their fundamental properties.
Moreover, this book includes smart solutions based on artificial
intelligence, machine learning, and deep learning for enhancing the
performance of social information network security protocols and
models. This book is a detailed reference for academicians,
professionals, and young researchers. The wide range of topics
provides extensive information and data for future research
challenges in present-day social information networks.
5G is the upcoming generation of the wireless network that will be
the advanced version of 4G LTE+ providing all the features of a 4G
LTE network and connectivity for IoT devices with faster speed and
lower latency. The 5G network is going to be a service-oriented
network, connecting billions of IoT devices and mobile phones
through the wireless network, and hence, it needs a special
emphasis on security. Security is the necessary enabler for the
continuity of the wireless network business, and in 5G, network
security for IoT devices is the most important aspect. As IoT is
gaining momentum, people can remotely operate or instruct their
network devices. Therefore, there is a need for robust security
mechanisms to prevent unauthorized access to the devices.
>Evolution of Software-Defined Networking Foundations for IoT
and 5G Mobile Networks is a collection of innovative research on
the security challenges and prevention mechanisms in high-speed
mobile networks. The book explores the threats to 5G and IoT and
how to implement effective security architecture for them. While
highlighting topics including artificial intelligence, mobile
technology, and ubiquitous computing, this book is ideally designed
for cybersecurity experts, network providers, computer scientists,
communication technologies experts, academicians, students, and
researchers.
The internet of things (IoT) revolution has given rise to smart
cities and villages all over the world. With technology
advancements such as cloud computing, fog computing, and
software-defined networking, it is necessary to examine ways that
these environments can implement innovation for cost-effective
citizen services and e-governance. Also, as cyber-physical systems
are becoming more vulnerable with IoT attacks threatening their
security and privacy, there is an even greater need for solutions
that offer protection for all of these advancing technologies. The
Handbook of Research on Implementation and Deployment of IoT
Projects in Smart Cities is an essential research publication that
combines theory and practice, reflecting on advancing technologies
for the automation, protection, and sustainability of urban
environments. Highlighting a wide range of topics such as
blockchain, smart grid, and sustainability, this book is ideal for
researchers, academicians, scientists, engineers, programmers, IT
consultants, professionals, and policymakers.
|
|