Security, data analytics, and energy-aware solutions in the IoT:
"While the recent rapid proliferation in hardware, software, and communication technologies have facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
[2022]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-83 DE-91 DE-706 Volltext |
Zusammenfassung: | "While the recent rapid proliferation in hardware, software, and communication technologies have facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any time and for anyone, this book addresses these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols, and interfaces to specific implementation approaches |
Beschreibung: | Includes bibliographical references and index Chapter 1. Towards named data networking for Internet of things search engines -- Chapter 2. The Internet of things from a legal perspective: the concern about personal data -- Chapter 3. Analysis of cell phone biometric sensors and security risk of the sensors -- Chapter 4. Attacks on voice assistant systems -- Chapter 5. Survey of automotive cyber-physical system security -- Chapter 6. Handwritten signature spoofing with conditional generative adversarial nets -- Chapter 7. Generating device fingerprints for smart device pairing using the unique spectrum characteristic from leds -- Chapter 8. Deep learning approach for protecting voice-controllable devices from laser attacks -- Chapter 9. Teleoperated surgical robot security: challenges and solutions -- Chapter 10. Brain-computer interface: attack surface analysis -- Chapter 11. Medical device security. - Mode of access: World Wide Web |
Beschreibung: | 1 Online-Ressource (218 Seiten) |
ISBN: | 9781799873259 |
DOI: | 10.4018/978-1-7998-7323-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047855975 | ||
003 | DE-604 | ||
005 | 20230516 | ||
007 | cr|uuu---uuuuu | ||
008 | 220225s2022 |||| o||u| ||||||eng d | ||
020 | |a 9781799873259 |9 978-1-79987-325-9 | ||
024 | 7 | |a 10.4018/978-1-7998-7323-5 |2 doi | |
035 | |a (ZDB-98-IGB)00262533 | ||
035 | |a (OCoLC)1302316130 | ||
035 | |a (DE-599)BVBBV047855975 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 004.678 | |
245 | 1 | 0 | |a Security, data analytics, and energy-aware solutions in the IoT |c Xiali Hei, editor |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c [2022] | |
300 | |a 1 Online-Ressource (218 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Chapter 1. Towards named data networking for Internet of things search engines -- Chapter 2. The Internet of things from a legal perspective: the concern about personal data -- Chapter 3. Analysis of cell phone biometric sensors and security risk of the sensors -- Chapter 4. Attacks on voice assistant systems -- Chapter 5. Survey of automotive cyber-physical system security -- Chapter 6. Handwritten signature spoofing with conditional generative adversarial nets -- Chapter 7. Generating device fingerprints for smart device pairing using the unique spectrum characteristic from leds -- Chapter 8. Deep learning approach for protecting voice-controllable devices from laser attacks -- Chapter 9. Teleoperated surgical robot security: challenges and solutions -- Chapter 10. Brain-computer interface: attack surface analysis -- Chapter 11. Medical device security. - Mode of access: World Wide Web | ||
520 | |a "While the recent rapid proliferation in hardware, software, and communication technologies have facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any time and for anyone, this book addresses these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols, and interfaces to specific implementation approaches | ||
650 | 4 | |a Internet of things |x Security measures | |
700 | 1 | |a Hei, Xiali |4 edt | |
710 | 2 | |a IGI Global |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781799873242 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1799873242 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1799873234 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781799873235 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1799873234 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-7323-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-7323-5 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7323-5 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7323-5 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7323-5 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7323-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7323-5 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7323-5 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079032198332416 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Hei, Xiali |
author2_role | edt |
author2_variant | x h xh |
author_facet | Hei, Xiali |
building | Verbundindex |
bvnumber | BV047855975 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)00262533 (OCoLC)1302316130 (DE-599)BVBBV047855975 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/978-1-7998-7323-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047855975</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230516</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220225s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799873259</subfield><subfield code="9">978-1-79987-325-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-7323-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00262533</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1302316130</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047855975</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, data analytics, and energy-aware solutions in the IoT</subfield><subfield code="c">Xiali Hei, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (218 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1. Towards named data networking for Internet of things search engines -- Chapter 2. The Internet of things from a legal perspective: the concern about personal data -- Chapter 3. Analysis of cell phone biometric sensors and security risk of the sensors -- Chapter 4. Attacks on voice assistant systems -- Chapter 5. Survey of automotive cyber-physical system security -- Chapter 6. Handwritten signature spoofing with conditional generative adversarial nets -- Chapter 7. Generating device fingerprints for smart device pairing using the unique spectrum characteristic from leds -- Chapter 8. Deep learning approach for protecting voice-controllable devices from laser attacks -- Chapter 9. Teleoperated surgical robot security: challenges and solutions -- Chapter 10. Brain-computer interface: attack surface analysis -- Chapter 11. Medical device security. - Mode of access: World Wide Web</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"While the recent rapid proliferation in hardware, software, and communication technologies have facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any time and for anyone, this book addresses these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols, and interfaces to specific implementation approaches</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hei, Xiali</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781799873242</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1799873242</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1799873234</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781799873235</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1799873234</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-7323-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7323-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7323-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7323-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7323-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7323-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7323-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7323-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047855975 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:16:17Z |
indexdate | 2024-07-20T06:38:32Z |
institution | BVB |
isbn | 9781799873259 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033238716 |
oclc_num | 1302316130 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (218 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHR_PDA_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB TUM_Paketkauf |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global |
record_format | marc |
spelling | Security, data analytics, and energy-aware solutions in the IoT Xiali Hei, editor Hershey, Pennsylvania IGI Global [2022] 1 Online-Ressource (218 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Chapter 1. Towards named data networking for Internet of things search engines -- Chapter 2. The Internet of things from a legal perspective: the concern about personal data -- Chapter 3. Analysis of cell phone biometric sensors and security risk of the sensors -- Chapter 4. Attacks on voice assistant systems -- Chapter 5. Survey of automotive cyber-physical system security -- Chapter 6. Handwritten signature spoofing with conditional generative adversarial nets -- Chapter 7. Generating device fingerprints for smart device pairing using the unique spectrum characteristic from leds -- Chapter 8. Deep learning approach for protecting voice-controllable devices from laser attacks -- Chapter 9. Teleoperated surgical robot security: challenges and solutions -- Chapter 10. Brain-computer interface: attack surface analysis -- Chapter 11. Medical device security. - Mode of access: World Wide Web "While the recent rapid proliferation in hardware, software, and communication technologies have facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any time and for anyone, this book addresses these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols, and interfaces to specific implementation approaches Internet of things Security measures Hei, Xiali edt IGI Global Sonstige oth Erscheint auch als Druck-Ausgabe 9781799873242 Erscheint auch als Druck-Ausgabe 1799873242 Erscheint auch als Druck-Ausgabe 1799873234 Erscheint auch als Druck-Ausgabe 9781799873235 https://doi.org/10.4018/978-1-7998-7323-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security, data analytics, and energy-aware solutions in the IoT Internet of things Security measures |
title | Security, data analytics, and energy-aware solutions in the IoT |
title_auth | Security, data analytics, and energy-aware solutions in the IoT |
title_exact_search | Security, data analytics, and energy-aware solutions in the IoT |
title_exact_search_txtP | Security, data analytics, and energy-aware solutions in the IoT |
title_full | Security, data analytics, and energy-aware solutions in the IoT Xiali Hei, editor |
title_fullStr | Security, data analytics, and energy-aware solutions in the IoT Xiali Hei, editor |
title_full_unstemmed | Security, data analytics, and energy-aware solutions in the IoT Xiali Hei, editor |
title_short | Security, data analytics, and energy-aware solutions in the IoT |
title_sort | security data analytics and energy aware solutions in the iot |
topic | Internet of things Security measures |
topic_facet | Internet of things Security measures |
url | https://doi.org/10.4018/978-1-7998-7323-5 |
work_keys_str_mv | AT heixiali securitydataanalyticsandenergyawaresolutionsintheiot AT igiglobal securitydataanalyticsandenergyawaresolutionsintheiot |