Показать сокращенную информацию
dc.contributor.author | Sahoo Biswa | |
dc.contributor.author | Yadav Suman | |
dc.date.accessioned | 2024-01-29T22:28:56Z | |
dc.date.available | 2024-01-29T22:28:56Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Information security practices for the Internet of Things, 5G, and next-generation wireless networks Advances in information security, privacy, and ethics (AISPE) book series. - 1 online resource (xv, 313 pages) : - URL: https://libweb.kpfu.ru/ebsco/pdf/3324975.pdf | |
dc.identifier.isbn | 9781668439234 | |
dc.identifier.isbn | 1668439239 | |
dc.identifier.isbn | 9781668439241 | |
dc.identifier.isbn | 1668439247 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/180761 | |
dc.description | Includes bibliographical references and index. | |
dc.description.abstract | "This book highlights research on secure communication of 5G, Internet of Things (IoT) and Next-Generation wireless networks, along with related areas to ensure secure and Internet-compatible IoT systems"-- | |
dc.description.tableofcontents | Chapter 1. IoT-enabled 5G networks for secure communication -- Chapter 2. 5th generation security threats and responses -- Chapter 3. Machine learning algorithms for 6G wireless networks: a survey -- Chapter 4. Security and privacy issues in the Internet of things -- Chapter 5. Role of artificial intelligence in cyber security: a useful overview -- Chapter 6. Privacy and security in wireless devices for the Internet of things -- Chapter 7. Application of blockchain technology in an IoT-integrated framework -- Chapter 8. Cryptography and blockchain solutions for security protection of Internet of things applications -- Chapter 9. Security optimization of resource-constrained internet of healthcare things (IohT) devices using lightweight cryptography -- Chapter 10. Edge computing enabled by 5G for computing offloading in the industrial Internet of things -- Chapter 11. Quantum communication is the next level of wireless networking and security -- Chapter 12. Scheduling optimization based on energy prediction using ARIMA model in WSN. | |
dc.language | English | |
dc.language.iso | en | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series. | |
dc.subject.other | Internet of things -- Security measures. | |
dc.subject.other | 5G mobile communication systems -- Security measures. | |
dc.subject.other | Internet des objets -- Sécurité -- Mesures. | |
dc.subject.other | Communications mobiles 5G -- Sécurité -- Mesures. | |
dc.subject.other | Electronic books. | |
dc.title | Information security practices for the Internet of Things, 5G, and next-generation wireless networks Advances in information security, privacy, and ethics (AISPE) book series./ Biswa Mohan Sahoo, Suman Avdhesh Yadav. | |
dc.type | Book | |
dc.description.pages | 1 online resource (xv, 313 pages) : | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C203017 |