The Fifth International Conference on Safety and Security with IoT [electronic resource] : SaSeIoT 2021 / edited by Anand Nayyar, Anand Paul, Sudeep Tanwar.

Colaborador(es): Nayyar, Anand [editor.] | Paul, Anand [editor.] | Tanwar, Sudeep [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries EAI/Springer Innovations in Communication and ComputingEditor: Cham : Springer International Publishing : Imprint: Springer, 2023Edición: 1st ed. 2023Descripción: XII, 205 p. 73 illus., 64 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783030942854Tema(s): Cooperating objects (Computer systems) | Telecommunication | Internet of things | Cyber-Physical Systems | Communications Engineering, Networks | Internet of ThingsFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 621.38 Clasificación LoC:TK7895.E42TK5105.8857Recursos en línea: Libro electrónicoTexto
Contenidos:
1. Opportunistic Multi-Modal User Authentication for Health-Tracking IoT Wearables -- 2. On-Phone CNN Model-based Implicit Authentication to Secure IoT Wearables -- 3. A Cybersecurity Guide for Using Fitness Devices -- 4. An efficient algorithm for human abnormal behaviour detection using object detection and pose estimation -- 5. A Secure and Scalable IoT Consensus Protocol -- 6. Session Key Agreement Protocol for Secure D2D Communication -- 7. What Do Your Smart-Home Devices Reveal About You? -- 8. A Quantum-Resistant and Fast Secure Boot for IoT Devices Using Hash-Based Signatures and SRAM PUFs -- 9. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment -- 10. Natural Scenes' Text Detection and Recognition using CNN and Pytesseract -- 11. Assessing the Resistance of Internet of Things Applications Against Memory Corruption Attacks: A Case Study for Contiki and Tizen -- 12. IoT geography chain: Blockchain based solution for Logistics eco system.
En: Springer Nature eBookResumen: This book presents the proceedings of the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021), which took place online. The conference aims to explore not only IoT and its related critical applications but also IoT towards Security and Safety. The conference solicits original and inspiring research contributions from experts, researchers, designers, and practitioners in academia, industry and related fields and provides a common platform to share knowledge, experience and best practices in various domains of IoT. Presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021) Includes tracks on security and management, IoT devices and Internet computing, cyber physical systems and artificial intelligence Supports research directions in the topics of security in IoT, wearable IoT and real time applications of IoT.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Acceso multiusuario

1. Opportunistic Multi-Modal User Authentication for Health-Tracking IoT Wearables -- 2. On-Phone CNN Model-based Implicit Authentication to Secure IoT Wearables -- 3. A Cybersecurity Guide for Using Fitness Devices -- 4. An efficient algorithm for human abnormal behaviour detection using object detection and pose estimation -- 5. A Secure and Scalable IoT Consensus Protocol -- 6. Session Key Agreement Protocol for Secure D2D Communication -- 7. What Do Your Smart-Home Devices Reveal About You? -- 8. A Quantum-Resistant and Fast Secure Boot for IoT Devices Using Hash-Based Signatures and SRAM PUFs -- 9. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment -- 10. Natural Scenes' Text Detection and Recognition using CNN and Pytesseract -- 11. Assessing the Resistance of Internet of Things Applications Against Memory Corruption Attacks: A Case Study for Contiki and Tizen -- 12. IoT geography chain: Blockchain based solution for Logistics eco system.

This book presents the proceedings of the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021), which took place online. The conference aims to explore not only IoT and its related critical applications but also IoT towards Security and Safety. The conference solicits original and inspiring research contributions from experts, researchers, designers, and practitioners in academia, industry and related fields and provides a common platform to share knowledge, experience and best practices in various domains of IoT. Presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021) Includes tracks on security and management, IoT devices and Internet computing, cyber physical systems and artificial intelligence Supports research directions in the topics of security in IoT, wearable IoT and real time applications of IoT.

UABC ; Perpetuidad

Con tecnología Koha