Emerging technologies for securing the cloud and IoT:
"In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data an...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2024.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data and devices, has also brought to the forefront a pressing concern - the susceptibility of these systems to security breaches. As cloud services integrate further into our daily lives and the IoT saturates every aspect of our routines, the looming potential for cyberattacks and data breaches necessitates immediate and robust solutions to fortify the protection of sensitive information, ensuring the privacy and integrity of individuals, organizations, and critical infrastructure.Emerging Technologies for Securing the Cloud and IoT emerges as a comprehensive and timely solution to address the multifaceted security challenges posed by these groundbreaking technologies. Edited by Amina Ahmed Nacer from the University of Lorraine, France, and Mohammed Riyadh Abdmeziem from Ecole Nationale Supérieur d'Informatique, Algeria, this book serves as an invaluable guide for both academic scholars and industry experts. Its content delves deeply into the intricate web of security concerns, elucidating the potential ramifications of unaddressed vulnerabilities within cloud and IoT systems. With a pragmatic focus on real-world applications, the book beckons authors to explore themes like security frameworks, integration of AI and machine learning, data safeguarding, threat modeling, and more. Authored by esteemed researchers, practitioners, and luminaries, each chapter bridges the divide between theory and implementation, aiming to be an authoritative reference empowering readers to adeptly navigate the complexities of securing cloud-based IoT systems. A crucial resource for scholars, students, professionals, and policymakers striving to comprehend, confront, and surmount contemporary and future security challenges, this book stands as the quintessential guide for ushering in an era of secure technological advancement."-- |
Beschreibung: | 21 PDFs (361 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9798369307670 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00324605 | ||
003 | IGIG | ||
005 | 20240414190106.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240410s2024 pau fob 001 0 eng d | ||
020 | |a 9798369307670 |q PDF | ||
020 | |z 9798369307663 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-0766-3 |2 doi | |
035 | |a (CaBNVSL)slc00005746 | ||
035 | |a (OCoLC)1429862736 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .E44 2024e | |
082 | 7 | |a 004.67/82 |2 23 | |
245 | 0 | 0 | |a Emerging technologies for securing the cloud and IoT |c Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. |
246 | 3 | |a Emerging technologies for securing the cloud and internet of things | |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2024. | |
300 | |a 21 PDFs (361 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data and devices, has also brought to the forefront a pressing concern - the susceptibility of these systems to security breaches. As cloud services integrate further into our daily lives and the IoT saturates every aspect of our routines, the looming potential for cyberattacks and data breaches necessitates immediate and robust solutions to fortify the protection of sensitive information, ensuring the privacy and integrity of individuals, organizations, and critical infrastructure.Emerging Technologies for Securing the Cloud and IoT emerges as a comprehensive and timely solution to address the multifaceted security challenges posed by these groundbreaking technologies. Edited by Amina Ahmed Nacer from the University of Lorraine, France, and Mohammed Riyadh Abdmeziem from Ecole Nationale Supérieur d'Informatique, Algeria, this book serves as an invaluable guide for both academic scholars and industry experts. Its content delves deeply into the intricate web of security concerns, elucidating the potential ramifications of unaddressed vulnerabilities within cloud and IoT systems. With a pragmatic focus on real-world applications, the book beckons authors to explore themes like security frameworks, integration of AI and machine learning, data safeguarding, threat modeling, and more. Authored by esteemed researchers, practitioners, and luminaries, each chapter bridges the divide between theory and implementation, aiming to be an authoritative reference empowering readers to adeptly navigate the complexities of securing cloud-based IoT systems. A crucial resource for scholars, students, professionals, and policymakers striving to comprehend, confront, and surmount contemporary and future security challenges, this book stands as the quintessential guide for ushering in an era of secure technological advancement."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 04/10/2024). | ||
650 | 0 | |a Blockchains (Databases) | |
650 | 0 | |a Cloud computing. | |
650 | 0 | |a Internet of things. | |
653 | |a Access Control. | ||
653 | |a Artificial Intelligence. | ||
653 | |a Authentication Protocols. | ||
653 | |a Blockchain. | ||
653 | |a Cloud Computing. | ||
653 | |a Data Protection. | ||
653 | |a Emerging Technologies. | ||
653 | |a Internet of Things (IoT). | ||
653 | |a Intrusion Prevention. | ||
653 | |a Machine Learning. | ||
653 | |a Privacy Preservation. | ||
653 | |a Risk Assessment. | ||
653 | |a Secure Communication. | ||
653 | |a Security Frameworks. | ||
653 | |a Threat Detection. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Abdmeziem, Mohammed Riyadh |e editor. | |
700 | 1 | |a Nacer, Amina Ahmed |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369307663 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0766-3 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0766-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00324605 |
---|---|
_version_ | 1826942602301145088 |
adam_text | |
any_adam_object | |
author2 | Abdmeziem, Mohammed Riyadh Nacer, Amina Ahmed |
author2_role | edt edt |
author2_variant | m r a mr mra a a n aa aan |
author_facet | Abdmeziem, Mohammed Riyadh Nacer, Amina Ahmed |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .E44 2024e |
callnumber-search | QA76.585 .E44 2024e |
callnumber-sort | QA 276.585 E44 42024E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT. |
ctrlnum | (CaBNVSL)slc00005746 (OCoLC)1429862736 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05607nam a2200649 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00324605</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240414190106.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240410s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369307670</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369307663</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-0766-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005746</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1429862736</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.E44 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Emerging technologies for securing the cloud and IoT </subfield><subfield code="c">Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Emerging technologies for securing the cloud and internet of things </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">21 PDFs (361 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data and devices, has also brought to the forefront a pressing concern - the susceptibility of these systems to security breaches. As cloud services integrate further into our daily lives and the IoT saturates every aspect of our routines, the looming potential for cyberattacks and data breaches necessitates immediate and robust solutions to fortify the protection of sensitive information, ensuring the privacy and integrity of individuals, organizations, and critical infrastructure.Emerging Technologies for Securing the Cloud and IoT emerges as a comprehensive and timely solution to address the multifaceted security challenges posed by these groundbreaking technologies. Edited by Amina Ahmed Nacer from the University of Lorraine, France, and Mohammed Riyadh Abdmeziem from Ecole Nationale Supérieur d'Informatique, Algeria, this book serves as an invaluable guide for both academic scholars and industry experts. Its content delves deeply into the intricate web of security concerns, elucidating the potential ramifications of unaddressed vulnerabilities within cloud and IoT systems. With a pragmatic focus on real-world applications, the book beckons authors to explore themes like security frameworks, integration of AI and machine learning, data safeguarding, threat modeling, and more. Authored by esteemed researchers, practitioners, and luminaries, each chapter bridges the divide between theory and implementation, aiming to be an authoritative reference empowering readers to adeptly navigate the complexities of securing cloud-based IoT systems. A crucial resource for scholars, students, professionals, and policymakers striving to comprehend, confront, and surmount contemporary and future security challenges, this book stands as the quintessential guide for ushering in an era of secure technological advancement."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/10/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Blockchains (Databases)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Access Control.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Artificial Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Authentication Protocols.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blockchain.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Protection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Emerging Technologies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet of Things (IoT).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intrusion Prevention.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Privacy Preservation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risk Assessment.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Secure Communication.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Frameworks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Threat Detection.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abdmeziem, Mohammed Riyadh</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nacer, Amina Ahmed</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369307663</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0766-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0766-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00324605 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:37Z |
institution | BVB |
isbn | 9798369307670 |
language | English |
oclc_num | 1429862736 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 21 PDFs (361 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spelling | Emerging technologies for securing the cloud and IoT Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. Emerging technologies for securing the cloud and internet of things Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2024. 21 PDFs (361 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT. Restricted to subscribers or individual electronic text purchasers. "In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while redefining how we interact with data and devices, has also brought to the forefront a pressing concern - the susceptibility of these systems to security breaches. As cloud services integrate further into our daily lives and the IoT saturates every aspect of our routines, the looming potential for cyberattacks and data breaches necessitates immediate and robust solutions to fortify the protection of sensitive information, ensuring the privacy and integrity of individuals, organizations, and critical infrastructure.Emerging Technologies for Securing the Cloud and IoT emerges as a comprehensive and timely solution to address the multifaceted security challenges posed by these groundbreaking technologies. Edited by Amina Ahmed Nacer from the University of Lorraine, France, and Mohammed Riyadh Abdmeziem from Ecole Nationale Supérieur d'Informatique, Algeria, this book serves as an invaluable guide for both academic scholars and industry experts. Its content delves deeply into the intricate web of security concerns, elucidating the potential ramifications of unaddressed vulnerabilities within cloud and IoT systems. With a pragmatic focus on real-world applications, the book beckons authors to explore themes like security frameworks, integration of AI and machine learning, data safeguarding, threat modeling, and more. Authored by esteemed researchers, practitioners, and luminaries, each chapter bridges the divide between theory and implementation, aiming to be an authoritative reference empowering readers to adeptly navigate the complexities of securing cloud-based IoT systems. A crucial resource for scholars, students, professionals, and policymakers striving to comprehend, confront, and surmount contemporary and future security challenges, this book stands as the quintessential guide for ushering in an era of secure technological advancement."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 04/10/2024). Blockchains (Databases) Cloud computing. Internet of things. Access Control. Artificial Intelligence. Authentication Protocols. Blockchain. Cloud Computing. Data Protection. Emerging Technologies. Internet of Things (IoT). Intrusion Prevention. Machine Learning. Privacy Preservation. Risk Assessment. Secure Communication. Security Frameworks. Threat Detection. Electronic books. Abdmeziem, Mohammed Riyadh editor. Nacer, Amina Ahmed editor. IGI Global, publisher. Print version: 9798369307663 |
spellingShingle | Emerging technologies for securing the cloud and IoT Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT. Blockchains (Databases) Cloud computing. Internet of things. |
title | Emerging technologies for securing the cloud and IoT |
title_alt | Emerging technologies for securing the cloud and internet of things |
title_auth | Emerging technologies for securing the cloud and IoT |
title_exact_search | Emerging technologies for securing the cloud and IoT |
title_full | Emerging technologies for securing the cloud and IoT Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. |
title_fullStr | Emerging technologies for securing the cloud and IoT Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. |
title_full_unstemmed | Emerging technologies for securing the cloud and IoT Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, editors. |
title_short | Emerging technologies for securing the cloud and IoT |
title_sort | emerging technologies for securing the cloud and iot |
topic | Blockchains (Databases) Cloud computing. Internet of things. |
topic_facet | Blockchains (Databases) Cloud computing. Internet of things. Electronic books. |
work_keys_str_mv | AT abdmeziemmohammedriyadh emergingtechnologiesforsecuringthecloudandiot AT naceraminaahmed emergingtechnologiesforsecuringthecloudandiot AT igiglobal emergingtechnologiesforsecuringthecloudandiot AT abdmeziemmohammedriyadh emergingtechnologiesforsecuringthecloudandinternetofthings AT naceraminaahmed emergingtechnologiesforsecuringthecloudandinternetofthings AT igiglobal emergingtechnologiesforsecuringthecloudandinternetofthings |