語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information security practices for the Internet of Things, 5G, and next-generation wireless networksBiswa Sahoo and Suman Yadav, editors.
其他作者:
Yadav, Suman.
出版者:
Hershey, Pennsylvania :IGI Global,2022.
面頁冊數:
1 online resource (313 p.)
標題:
Internet of thingsSecurity measures.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3921-0
ISBN:
9781668439234 (electronic bk.)
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
[electronic resource] /Biswa Sahoo and Suman Yadav, editors. - Hershey, Pennsylvania :IGI Global,2022. - 1 online resource (313 p.)
Includes bibliographical references and index.
Chapter 1. IoT-enabled 5G networks for secure communication -- Chapter 2. 5th generation security threats and responses -- Chapter 3. Machine learning algorithms for 6G wireless networks: a survey -- Chapter 4. Security and privacy issues in the Internet of things -- Chapter 5. Role of artificial intelligence in cyber security: a useful overview -- Chapter 6. Privacy and security in wireless devices for the Internet of things -- Chapter 7. Application of blockchain technology in an IoT-integrated framework -- Chapter 8. Cryptography and blockchain solutions for security protection of Internet of things applications -- Chapter 9. Security optimization of resource-constrained internet of healthcare things(IohT) devices using lightweight cryptography -- Chapter 10. Edge computing enabled by 5G for computing offloading in the industrial Internet of things -- Chapter 11. Quantum communication is the next level of wireless networking and security -- Chapter 12. Scheduling optimization based on energy prediction using ARIMA model in WSN.
"This book highlights research on secure communication of 5G, Internet of Things (IoT) and Next-Generation wireless networks, along with related areas to ensure secure and Internet-compatible IoT systems."
ISBN: 9781668439234 (electronic bk.)Subjects--Topical Terms:
770009
Internet of things
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5105.8857 / .I57 2022eb
Dewey Class. No.: 004.678
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
LDR
:02261nmm a2200289 a 4500
001
644205
006
m d
007
cr nn muauu
008
231206s2022 pau fob 001 0 eng d
020
$a
9781668439234 (electronic bk.)
020
$a
9781668439227$qsoftcover
020
$a
1668439220
020
$a
1668439212
020
$a
9781668439210
035
$a
(CaBNVSL)slc00002878
035
$a
(OCoLC)1302332479
035
$a
00286775
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
TK5105.8857
$b
.I57 2022eb
082
0 4
$a
004.678
$2
23
245
0 0
$a
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
$h
[electronic resource] /
$c
Biswa Sahoo and Suman Yadav, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2022.
300
$a
1 online resource (313 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. IoT-enabled 5G networks for secure communication -- Chapter 2. 5th generation security threats and responses -- Chapter 3. Machine learning algorithms for 6G wireless networks: a survey -- Chapter 4. Security and privacy issues in the Internet of things -- Chapter 5. Role of artificial intelligence in cyber security: a useful overview -- Chapter 6. Privacy and security in wireless devices for the Internet of things -- Chapter 7. Application of blockchain technology in an IoT-integrated framework -- Chapter 8. Cryptography and blockchain solutions for security protection of Internet of things applications -- Chapter 9. Security optimization of resource-constrained internet of healthcare things(IohT) devices using lightweight cryptography -- Chapter 10. Edge computing enabled by 5G for computing offloading in the industrial Internet of things -- Chapter 11. Quantum communication is the next level of wireless networking and security -- Chapter 12. Scheduling optimization based on energy prediction using ARIMA model in WSN.
520
3
$a
"This book highlights research on secure communication of 5G, Internet of Things (IoT) and Next-Generation wireless networks, along with related areas to ensure secure and Internet-compatible IoT systems."
650
0
$a
Internet of things
$x
Security measures.
$3
770009
650
0
$a
5G mobile communication systems
$x
Security measures.
$3
917573
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Yadav, Suman.
$3
952561
700
1
$a
Sahoo, Biswa.
$3
952562
710
2
$a
IGI Global.
$3
529832
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3921-0
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000230552
電子館藏
1圖書
電子書
EB TK5105.8857 .I57 2022eb 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3921-0
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入