|
|
|
|
LEADER |
00000cam a22000001i 4500 |
001 |
SCIDIR_on1230560828 |
003 |
OCoLC |
005 |
20231120010526.0 |
006 |
m d |
007 |
cr ||||||||||| |
008 |
200817s2021 ne a o 000 0 eng d |
040 |
|
|
|a UKMGB
|b eng
|e rda
|e pn
|c UKMGB
|d OPELS
|d OCLCF
|d OCLCO
|d ABC
|d OCLCO
|d K6U
|d OCLCQ
|
015 |
|
|
|a GBC0C5421
|2 bnb
|
016 |
7 |
|
|a 019898579
|2 Uk
|
020 |
|
|
|a 9780128216033
|q (ePub ebook)
|
020 |
|
|
|a 0128216034
|
020 |
|
|
|a 9780128215999
|q (electronic bk.)
|
020 |
|
|
|a 0128215992
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)1230560828
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 006.312
|2 23
|
245 |
0 |
0 |
|a Security in IoT social networks /
|c edited by Fadi Al-Turjman, B.D. Deebak.
|
264 |
|
1 |
|a Amsterdam :
|b Academic Press,
|c 2021.
|
300 |
|
|
|a 1 online resource :
|b illustrations.
|
336 |
|
|
|a text
|2 rdacontent
|
336 |
|
|
|a still image
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
0 |
|
|a Intelligent data centric systems
|
505 |
0 |
|
|a 1. Security Issues and Technical Challenges in IoT-enabled Social Networks<br>2. Emerging Social IoT Applications and Security Assurance<br>3. Optimized Security Models and deep learning for Social IoT Networks<br>4. Key Agreement and Social IoT networks<br>5. Biometrics and Authentication Methods in the IoT Era<br>6. Forensic Analysis in Social IoT Applications<br>7. Recommended IoT Systems -- Security Threats and Mechanisms<br>8. Enabling Cyber-Physical Technologies for Social IoT Networks<br>9. Deception Detection for Fake Injections in IoT Networks<br>10. Social Networking for medical and health care application
|
588 |
|
|
|a Description based on CIP data; resource not viewed.
|
520 |
|
|
|a Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Big data.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet of things.
|
650 |
|
2 |
|a Data Mining
|0 (DNLM)D057225
|
650 |
|
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
|
6 |
|a Exploration de donn�ees (Informatique)
|0 (CaQQLa)201-0300292
|
650 |
|
6 |
|a Donn�ees volumineuses.
|0 (CaQQLa)000284673
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Internet des objets.
|0 (CaQQLa)000269177
|
650 |
|
7 |
|a Big data.
|2 fast
|0 (OCoLC)fst01892965
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data mining.
|2 fast
|0 (OCoLC)fst00887946
|
650 |
|
7 |
|a Internet of things.
|2 fast
|0 (OCoLC)fst01894151
|
700 |
1 |
|
|a Al-Turjman, Fadi,
|e editor.
|
700 |
1 |
|
|a Deebak, B. D.,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|z 9780128215999
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128215999
|z Texto completo
|