Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information security practices for the Internet of Things, 5G, and next-generation wireless networksBiswa Sahoo and Suman Yadav, editors.
other author:
Yadav, Suman.
Published:
Hershey, Pennsylvania :IGI Global,2022.
Description:
1 online resource (313 p.)
Subject:
Internet of thingsSecurity measures.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3921-0
ISBN:
9781668439234 (electronic bk.)
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
[electronic resource] /Biswa Sahoo and Suman Yadav, editors. - Hershey, Pennsylvania :IGI Global,2022. - 1 online resource (313 p.)
Includes bibliographical references and index.
Chapter 1. IoT-enabled 5G networks for secure communication -- Chapter 2. 5th generation security threats and responses -- Chapter 3. Machine learning algorithms for 6G wireless networks: a survey -- Chapter 4. Security and privacy issues in the Internet of things -- Chapter 5. Role of artificial intelligence in cyber security: a useful overview -- Chapter 6. Privacy and security in wireless devices for the Internet of things -- Chapter 7. Application of blockchain technology in an IoT-integrated framework -- Chapter 8. Cryptography and blockchain solutions for security protection of Internet of things applications -- Chapter 9. Security optimization of resource-constrained internet of healthcare things(IohT) devices using lightweight cryptography -- Chapter 10. Edge computing enabled by 5G for computing offloading in the industrial Internet of things -- Chapter 11. Quantum communication is the next level of wireless networking and security -- Chapter 12. Scheduling optimization based on energy prediction using ARIMA model in WSN.
"This book highlights research on secure communication of 5G, Internet of Things (IoT) and Next-Generation wireless networks, along with related areas to ensure secure and Internet-compatible IoT systems."
ISBN: 9781668439234 (electronic bk.)Subjects--Topical Terms:
770009
Internet of things
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5105.8857 / .I57 2022eb
Dewey Class. No.: 004.678
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
LDR
:02261nmm a2200289 a 4500
001
644205
006
m d
007
cr nn muauu
008
231206s2022 pau fob 001 0 eng d
020
$a
9781668439234 (electronic bk.)
020
$a
9781668439227$qsoftcover
020
$a
1668439220
020
$a
1668439212
020
$a
9781668439210
035
$a
(CaBNVSL)slc00002878
035
$a
(OCoLC)1302332479
035
$a
00286775
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
TK5105.8857
$b
.I57 2022eb
082
0 4
$a
004.678
$2
23
245
0 0
$a
Information security practices for the Internet of Things, 5G, and next-generation wireless networks
$h
[electronic resource] /
$c
Biswa Sahoo and Suman Yadav, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2022.
300
$a
1 online resource (313 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. IoT-enabled 5G networks for secure communication -- Chapter 2. 5th generation security threats and responses -- Chapter 3. Machine learning algorithms for 6G wireless networks: a survey -- Chapter 4. Security and privacy issues in the Internet of things -- Chapter 5. Role of artificial intelligence in cyber security: a useful overview -- Chapter 6. Privacy and security in wireless devices for the Internet of things -- Chapter 7. Application of blockchain technology in an IoT-integrated framework -- Chapter 8. Cryptography and blockchain solutions for security protection of Internet of things applications -- Chapter 9. Security optimization of resource-constrained internet of healthcare things(IohT) devices using lightweight cryptography -- Chapter 10. Edge computing enabled by 5G for computing offloading in the industrial Internet of things -- Chapter 11. Quantum communication is the next level of wireless networking and security -- Chapter 12. Scheduling optimization based on energy prediction using ARIMA model in WSN.
520
3
$a
"This book highlights research on secure communication of 5G, Internet of Things (IoT) and Next-Generation wireless networks, along with related areas to ensure secure and Internet-compatible IoT systems."
650
0
$a
Internet of things
$x
Security measures.
$3
770009
650
0
$a
5G mobile communication systems
$x
Security measures.
$3
917573
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Yadav, Suman.
$3
952561
700
1
$a
Sahoo, Biswa.
$3
952562
710
2
$a
IGI Global.
$3
529832
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3921-0
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000230552
電子館藏
1圖書
電子書
EB TK5105.8857 .I57 2022eb 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3921-0
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login