|
Showing 1 - 19 of
19 matches in All Departments
The main goal of Internet of Things (IoT) is to make secure,
reliable, and fully automated smart environments. However, there
are many technological challenges in deploying IoT. This includes
connectivity and networking, timeliness, power and energy
consumption dependability, security and privacy, compatibility and
longevity, and network/protocol standards. Internet of Things and
Secure Smart Environments: Successes and Pitfalls provides a
comprehensive overview of recent research and open problems in the
area of IoT research. Features: Presents cutting edge topics and
research in IoT Includes contributions from leading worldwide
researchers Focuses on IoT architectures for smart environments
Explores security, privacy, and trust Covers data handling and
management (accumulation, abstraction, storage, processing,
encryption, fast retrieval, security, and privacy) in IoT for smart
environments This book covers state-of-the-art problems, presents
solutions, and opens research directions for researchers and
scholars in both industry and academia.
The main goal of Internet of Things (IoT) is to make secure,
reliable, and fully automated smart environments. However, there
are many technological challenges in deploying IoT. This includes
connectivity and networking, timeliness, power and energy
consumption dependability, security and privacy, compatibility and
longevity, and network/protocol standards. Internet of Things and
Secure Smart Environments: Successes and Pitfalls provides a
comprehensive overview of recent research and open problems in the
area of IoT research. Features: Presents cutting edge topics and
research in IoT Includes contributions from leading worldwide
researchers Focuses on IoT architectures for smart environments
Explores security, privacy, and trust Covers data handling and
management (accumulation, abstraction, storage, processing,
encryption, fast retrieval, security, and privacy) in IoT for smart
environments This book covers state-of-the-art problems, presents
solutions, and opens research directions for researchers and
scholars in both industry and academia.
Although comprehensive knowledge of cyber-physical systems (CPS) is
becoming a must for researchers, practitioners, system designers,
policy makers, system managers, and administrators, there has been
a need for a comprehensive and up-to-date source of research and
information on cyber-physical systems. This book fills that need.
Cyber-Physical Systems: From Theory to Practice provides
state-of-the-art research results and reports on emerging trends
related to the science, technology, and engineering of CPS,
including system architecture, development, modeling, simulation,
security, privacy, trust, and energy efficiency. It presents the
research results of esteemed professionals on cutting-edge advances
in cyber-physical systems that include communications, computing,
and control. The book consists of eight sections, each containing
chapters contributed by leading experts in the field. Each section
covers a different area that impacts the design, modeling, and
evaluation of CPS, including: Control systems Modeling and design
Communications and signal processing Mobility issues Architecture
Security issues Sensors and applications Computing issues The
book's coverage includes cyber-physical system architecture, mobile
cyber-physical systems, cyber-physical systems for intelligent
(road/air) transportation, and cyber-physical system applications
and standardization. With the CPS field advancing so rapidly, this
book is an ideal reference to help researchers, system designers,
and practitioners manufacture devices that are compatible with CPS
standards. Presenting numerous examples that illustrate practical
applications derived from theory, the book is also suitable for use
as a textbook in upper undergraduate and graduate-level university
courses.
A cognitive network makes use of the information gathered from the
network in order to sense the environment, plan actions according
to the input, and make appropriate decisions using a reasoning
engine. The ability of cognitive networks to learn from the past
and use that knowledge to improve future decisions makes them a key
area of interest for anyone whose work involves wireless networks
and communications. Cognitive Networks: Applications and
Deployments examines recent developments in cognitive networks from
the perspective of cutting-edge applications and deployments.
Presenting the contributions of internationally renowned experts,
it supplies complete and balanced treatment of the fundamentals of
both cognitive radio communications and cognitive networks-together
with implementation details. The book includes case studies and
detailed descriptions of cognitive radio platforms and testbeds
that demonstrate how to build real-world cognitive radio systems
and network architectures. It begins with an introduction to
efficient spectrum management and presents a survey on joint
routing and dynamic spectrum access in cognitive radio networks.
Next, it examines radio spectrum sensing and network coding and
design. It explores intelligent routing in graded cognitive
networks and presents an energy-efficient routing protocol for
cognitive radio ad hoc networks. The book concludes by considering
dynamic radio spectrum access and examining vehicular cognitive
networks and applications. Presenting the latest standards and
spectrum policy developments, the book's strong practical
orientation provides you with the understanding you will need to
participate in the development of compliant cognitive systems.
|
Smart Technologies for Sustainable and Resilient Ecosystems - 3rd EAI International Conference, Edge-IoT 2022, and 4th EAI International Conference, SmartGov 2022, Virtual Events, November 16-18, 2022, Proceedings (1st ed. 2023)
Sérgio Ivan Lopes, Paula Fraga-Lamas, Tiago M. Fernándes-Camáres, Babu R. Dawadi, Danda B. Rawat, …
|
R1,907
Discovery Miles 19 070
|
Ships in 10 - 15 working days
|
This book constitutes the jointly proceedings of the 3rd
International Conference on Intelligent Edge Processing in the IoT
Era, Edge-IoT 2022, and the 4th International Conference on Smart
Governance for Sustainable Smart Cities, SmartGov 2022. Both
conferences were held online due to COVID-19 pandemic in November
2022, held as virtual events, in November 16-18, 2022. The 12 full
papers were selected from 31 submissions. SmartGov 2022 was to
promote the development of secure and sustainable smart cities with
smart governance, while the theme of Edge-IoT 2022 was to address
the decentralization of contemporary processing paradigms, notably
Edge processing, focusing on the increasing demand for intelligent
processing at the edge of the network, which is paving the way to
the Intelligent IoT Eraâ€. Both the EAI SmartGov 2022 and EAI
Edge-IoT 2022 conferences were co-located with EAI SmartCity360
international convention. The papers are organized in the following
topical sections: Edge-IoT Applications; IoT Architectures,
Forecasting and Adversarial Training; Artificial Intelligence and
Machine Learning for smart governance; and Smart Transportation.
This book develops the core system science needed to enable the
development of a complex industrial internet of
things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering
contributions from leading experts in the field with years of
experience in advancing manufacturing, it fosters a research
community committed to advancing research and education in
IIoT/M-CPS and to translating applicable science and technology
into engineering practice. Presenting the current state of IIoT and
the concept of cybermanufacturing, this book is at the nexus of
research advances from the engineering and computer and information
science domains. Readers will acquire the core system science
needed to transform to cybermanufacturing that spans the full
spectrum from ideation to physical realization.
This book provides probabilistic, deterministic and
geolocation-aware approaches for adaptive connectivity, robust
security and privacy-aware communications for vehicular cyber
physical systems (CPS). It presents mathematical models and
numerical results obtained from experiments and simulations, and a
trade-off between connectivity, security and privacy for vehicular
communications. Connectivity between vehicles is crucial for
vehicular CPS. Intelligent vehicular CPS provides not only road
safety and traffic efficiency by exchanging information among
vehicles, but also offers infotainment services to passengers using
a variety of wireless technologies to forward the
traffic/trajectory information with Vehicle-to-Vehicle (V2V),
vehicular ad hoc network (VANET), and
Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book
covers how to ensure that the message received from other vehicles
is secure and trustworthy, rather than malicious. Further, it
reveals how to make sure that the privacy of participants is not
revealed while validating the received message. Researchers and
professionals working with vehicular networks, smart systems, cyber
physical systems, and mobile privacy will find this book valuable.
This book develops the core system science needed to enable the
development of a complex industrial internet of
things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering
contributions from leading experts in the field with years of
experience in advancing manufacturing, it fosters a research
community committed to advancing research and education in
IIoT/M-CPS and to translating applicable science and technology
into engineering practice. Presenting the current state of IIoT and
the concept of cybermanufacturing, this book is at the nexus of
research advances from the engineering and computer and information
science domains. Readers will acquire the core system science
needed to transform to cybermanufacturing that spans the full
spectrum from ideation to physical realization.
This book provides probabilistic, deterministic and
geolocation-aware approaches for adaptive connectivity, robust
security and privacy-aware communications for vehicular cyber
physical systems (CPS). It presents mathematical models and
numerical results obtained from experiments and simulations, and a
trade-off between connectivity, security and privacy for vehicular
communications. Connectivity between vehicles is crucial for
vehicular CPS. Intelligent vehicular CPS provides not only road
safety and traffic efficiency by exchanging information among
vehicles, but also offers infotainment services to passengers using
a variety of wireless technologies to forward the
traffic/trajectory information with Vehicle-to-Vehicle (V2V),
vehicular ad hoc network (VANET), and
Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book
covers how to ensure that the message received from other vehicles
is secure and trustworthy, rather than malicious. Further, it
reveals how to make sure that the privacy of participants is not
revealed while validating the received message. Researchers and
professionals working with vehicular networks, smart systems, cyber
physical systems, and mobile privacy will find this book valuable.
|
Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings (Paperback, 2014 ed.)
Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin
|
R2,926
Discovery Miles 29 260
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the International
Symposium on Security in Computing and Communications, SSCC 2014,
held in Delhi, India, in September 2013. The 36 revised full papers
presented together with 12 work-in-progress papers were carefully
reviewed and selected from 132 submissions. The papers are
organized in topical sections on security and privacy in networked
systems; authentication and access control systems; encryption and
cryptography; system and network security; work-in-progress.
Although comprehensive knowledge of cyber-physical systems (CPS) is
becoming a must for researchers, practitioners, system designers,
policy makers, system managers, and administrators, there has been
a need for a comprehensive and up-to-date source of research and
information on cyber-physical systems. This book fills that need.
Cyber-Physical Systems: From Theory to Practice provides
state-of-the-art research results and reports on emerging trends
related to the science, technology, and engineering of CPS,
including system architecture, development, modeling, simulation,
security, privacy, trust, and energy efficiency. It presents the
research results of esteemed professionals on cutting-edge advances
in cyber-physical systems that include communications, computing,
and control. The book consists of eight sections, each containing
chapters contributed by leading experts in the field. Each section
covers a different area that impacts the design, modeling, and
evaluation of CPS, including: Control systems Modeling and design
Communications and signal processing Mobility issues Architecture
Security issues Sensors and applications Computing issues The
book's coverage includes cyber-physical system architecture, mobile
cyber-physical systems, cyber-physical systems for intelligent
(road/air) transportation, and cyber-physical system applications
and standardization. With the CPS field advancing so rapidly, this
book is an ideal reference to help researchers, system designers,
and practitioners manufacture devices that are compatible with CPS
standards. Presenting numerous examples that illustrate practical
applications derived from theory, the book is also suitable for use
as a textbook in upper undergraduate and graduate-level university
courses.
|
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun I. Fan
|
R1,348
Discovery Miles 13 480
|
Ships in 12 - 17 working days
|
This book constitutes revised selected papers of the 8th
International Symposium on Security in Computing and
Communications, SSCC 2020, held in Chennai, India, in October 2020.
Due to the COVID-19 pandemic the conference was held online. The 13
revised full papers and 8 revised short papers presented were
carefully reviewed and selected from 42 submissions. The papers
cover wide research fields including cryptography, database and
storage security, human and societal aspects of security and
privacy.
|
Science and Technologies for Smart Cities - 7th EAI International Conference, SmartCity360 Degrees, Virtual Event, December 2-4, 2021, Proceedings (Paperback, 1st ed. 2022)
Sara Paiva, Xuejun Li, Sergio Ivan Lopes, Nishu Gupta, Danda B. Rawat, …
|
R3,608
Discovery Miles 36 080
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 7th Annual
SmartCity360 Degrees Summit which was organized in November 2021 in
Porto, Portugal. Due to COVID-19 pandemic the conference was held
virtually. The volume combines selected papers of 6 conferences,
namely EdgeIoT 2021 - International Conference on Intelligent Edge
Processing in the IoT Era; IC4S 2021 - International Conference on
Cognitive Computing and Cyber Physical Systems; SmartGov 2021 -
International Conference on Smart Governance for Sustainable Smart
Cities; SmartGift 2021 - International Conference on Smart Grid and
Innovative Frontiers in Telecommunications; e PFSM 2021 -
International Conference on Privacy and Forensics in Smart
Mobility. The 45 full papers were carefully selected from 109
submissions. The papers are organized in four thematic sections on
Smart Grid and Innovative Frontiers in Telecommunications; Smart
Governance for Sustainable Smart Cities; Privacy and Forensics in
Smart Mobility; and Sensor Systems and Software.
Smart Cities Cybersecurity and Privacy examines the latest research
developments and their outcomes for safe, secure, and trusting
smart cities residents. Smart cities improve the quality of life of
citizens in their energy and water usage, healthcare, environmental
impact, transportation needs, and many other critical city
services. Recent advances in hardware and software, have fueled the
rapid growth and deployment of ubiquitous connectivity between a
city's physical and cyber components. This connectivity however
also opens up many security vulnerabilities that must be mitigated.
Smart Cities Cybersecurity and Privacy helps researchers,
engineers, and city planners develop adaptive, robust, scalable,
and reliable security and privacy smart city applications that can
mitigate the negative implications associated with cyber-attacks
and potential privacy invasion. It provides insights into
networking and security architectures, designs, and models for the
secure operation of smart city applications.
Cyber-Physical Systems: Foundations, Principles and Applications
explores the core system science perspective needed to design and
build complex cyber-physical systems. Using Systems Science's
underlying theories, such as probability theory, decision theory,
game theory, organizational sociology, behavioral economics, and
cognitive psychology, the book addresses foundational issues
central across CPS applications, including System Design -- How to
design CPS to be safe, secure, and resilient in rapidly evolving
environments, System Verification -- How to develop effective
metrics and methods to verify and certify large and complex CPS,
Real-time Control and Adaptation -- How to achieve real-time
dynamic control and behavior adaptation in a diverse environments,
such as clouds and in network-challenged spaces, Manufacturing --
How to harness communication, computation, and control for
developing new products, reducing product concepts to realizable
designs, and producing integrated software-hardware systems at a
pace far exceeding today's timeline. The book is part of the
Intelligent Data-Centric Systems: Sensor-Collected Intelligence
series edited by Fatos Xhafa, Technical University of Catalonia.
Indexing: The books of this series are submitted to EI-Compendex
and SCOPUS
This SpringerBrief presents adaptive resource allocation schemes
for secondary users for dynamic spectrum access (DSA) in cognitive
radio networks (CRNs) by considering Quality-of-Service
requirements, admission control, power/rate control, interference
constraints, and the impact of spectrum sensing or primary user
interruptions. It presents the challenges, motivations, and
applications of the different schemes. The authors discuss
cloud-assisted geolocation-aware adaptive resource allocation in
CRNs by outsourcing computationally intensive processing to the
cloud. Game theoretic approaches are presented to solve resource
allocation problems in CRNs. Numerical results are presented to
evaluate the performance of the proposed methods. Adaptive Resource
Allocation in Cognitive Radio Networks is designed for
professionals and researchers working in the area of wireless
networks. Advanced-level students in electrical engineering and
computer science, especially those focused on wireless networks,
will find this information helpful.
Computer and Network Security: An Experimental Approach provides
unique experimental approach to get hands-on experience to succeed
as computer and network security professionals. Lab activities are
based on Windows and BackTrack/Linux based network security tools
such as Snort, pfSense, Wireshark, Metasploit, Nmap, Zenmap, Hping,
Aircrack, and so on.
While security is of vital importance to ensure the integrity of
communications in wireless and mobile networks, most businesses
which rely on these networks expect a high level of security and
privacy to ensure the integrity and confidentiality of
communications among terminals, networks, applications, and
services. Security, Privacy, Trust, and Resource Management in
Mobile and Wireless Communications examines the current scope of
theoretical and practical applications on the security of mobile
and wireless communications. This book covers fundamental concepts
of current issues, challenges, and solutions in wireless and mobile
networks and will serve as a reference for graduate students,
professors, and researchers in this emerging field.
A cognitive network makes use of the information gathered from the
network in order to sense the environment, plan actions according
to the input, and make appropriate decisions using a reasoning
engine. The ability of cognitive networks to learn from the past
and use that knowledge to improve future decisions makes them a key
area of interest for anyone whose work involves wireless networks
and communications. Cognitive Networks: Applications and
Deployments examines recent developments in cognitive networks from
the perspective of cutting-edge applications and deployments.
Presenting the contributions of internationally renowned experts,
it supplies complete and balanced treatment of the fundamentals of
both cognitive radio communications and cognitive networks-together
with implementation details. The book includes case studies and
detailed descriptions of cognitive radio platforms and testbeds
that demonstrate how to build real-world cognitive radio systems
and network architectures. It begins with an introduction to
efficient spectrum management and presents a survey on joint
routing and dynamic spectrum access in cognitive radio networks.
Next, it examines radio spectrum sensing and network coding and
design. It explores intelligent routing in graded cognitive
networks and presents an energy-efficient routing protocol for
cognitive radio ad hoc networks. The book concludes by considering
dynamic radio spectrum access and examining vehicular cognitive
networks and applications. Presenting the latest standards and
spectrum policy developments, the book's strong practical
orientation provides you with the understanding you will need to
participate in the development of compliant cognitive systems.
|
You may like...
Southpaw
Jake Gyllenhaal, Forest Whitaker, …
DVD
R99
R24
Discovery Miles 240
Sound Of Freedom
Jim Caviezel, Mira Sorvino, …
DVD
R325
R218
Discovery Miles 2 180
|