Details

Title Advances in information security, privacy, and ethics (AISPE) book series. — Information security practices for the Internet of Things, 5G, and next-generation wireless networks
Other creators Sahoo Biswa ; Yadav Suman
Collection Электронные книги зарубежных издательств ; Общая коллекция
Subjects Internet of things — Security measures. ; 5G mobile communication systems — Security measures. ; Internet des objets — Sécurité — Mesures. ; Communications mobiles 5G — Sécurité — Mesures. ; EBSCO eBooks
Document type Other
File type PDF
Language English
Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
Record key on1302332479
Record create date 3/2/2022

Allowed Actions

pdf/3324975.pdf
Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network
epub/3324975.epub
Action 'Download' will be available if you login or access site from another network
Group Anonymous
Network Internet

"This book highlights research on secure communication of 5G, Internet of Things (IoT) and Next-Generation wireless networks, along with related areas to ensure secure and Internet-compatible IoT systems"--.

Network User group Action
ILC SPbPU Local Network All
Read Print Download
Internet Authorized users SPbPU
Read Print Download
Internet Anonymous
  • Cover
  • Title Page
  • Copyright Page
  • Book Series
  • Table of Contents
  • Detailed Table of Contents
  • Preface
  • Chapter 1: IoT-Enabled 5G Networks for Secure Communication
  • Chapter 2: 5th Generation Security Threats and Responses
  • Chapter 3: Machine Learning Algorithms for 6G Wireless Networks
  • Chapter 4: Security and Privacy Issues in the Internet of Things
  • Chapter 5: Role of Artificial Intelligence in Cyber Security
  • Chapter 6: Privacy and Security in Wireless Devices for the Internet of Things
  • Chapter 7: Application of Blockchain Technology in an IoT-Integrated Framework
  • Chapter 8: Cryptography and Blockchain Solutions for Security Protection of Internet of Things Applications
  • Chapter 9: Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Lightweight Cryptography
  • Chapter 10: Edge Computing Enabled by 5G for Computing Offloading in the Industrial Internet of Things
  • Chapter 11: Quantum Communication Is the Next Level of Wireless Networking and Security
  • Chapter 12: Scheduling Optimization Based on Energy Prediction Using ARIMA Model in WSN
  • Compilation of References
  • About the Contributors
  • Index
pdf/3324975.pdf

Access count: 0 
Last 30 days: 0

Detailed usage statistics

epub/3324975.epub

Access count: 0 
Last 30 days: 0

Detailed usage statistics