Details
Title | Advances in web technologies and engineering (AWTE) book series. — Security, data analytics, and energy-aware solutions in the IoT |
---|---|
Other creators | Hei Xiali |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Internet of things — Security measures. ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1260167378 |
Record create date | 7/7/2021 |
Allowed Actions
pdf/3129230.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/3129230.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
"While the recent rapid proliferation in hardware, software, and communication technologies have facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any time and for anyone, this book addresses these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols, and interfaces to specific implementation approaches"--.
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Cover
- Title Page
- Copyright Page
- Book Series
- Table of Contents
- Detailed Table of Contents
- Preface
- Introduction
- Chapter 1: Towards Named Data Networking for Internet of Things Search Engines
- Chapter 2: The Internet of Things From a Legal Perspective
- Chapter 3: Analysis of Cell Phone Biometric Sensors and Security Risk of the Sensors
- Chapter 4: Attacks on Voice Assistant Systems
- Chapter 5: Survey of Automotive Cyber-Physical System Security
- Chapter 6: Handwritten Signature Spoofing With Conditional Generative Adversarial Nets
- Chapter 7: Generating Device Fingerprints for Smart Device Pairing Using the Unique Spectrum Characteristic From LEDs
- Chapter 8: Deep Learning Approach for Protecting Voice-Controllable Devices From Laser Attacks
- Chapter 9: Teleoperated Surgical Robot Security
- Chapter 10: Brain-Computer Interface
- Chapter 11: Medical Device Security
- Conclusion
- Compilation of References
- About the Contributors
- Index