語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security in Smart Cities: Models, Ap...
~
Singh, Amit Kumar.
Security in Smart Cities: Models, Applications, and Challenges
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security in Smart Cities: Models, Applications, and Challenges/ edited by Aboul Ella Hassanien, Mohamed Elhoseny, Syed Hassan Ahmed, Amit Kumar Singh.
其他作者:
Hassanien, Aboul Ella.
面頁冊數:
VIII, 364 p. 150 illus., 84 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computational intelligence. -
電子資源:
https://doi.org/10.1007/978-3-030-01560-2
ISBN:
9783030015602
Security in Smart Cities: Models, Applications, and Challenges
Security in Smart Cities: Models, Applications, and Challenges
[electronic resource] /edited by Aboul Ella Hassanien, Mohamed Elhoseny, Syed Hassan Ahmed, Amit Kumar Singh. - 1st ed. 2019. - VIII, 364 p. 150 illus., 84 illus. in color.online resource. - Lecture Notes in Intelligent Transportation and Infrastructure,2523-3440. - Lecture Notes in Intelligent Transportation and Infrastructure,.
Part I: Challenges of Smart Healthcare Applications -- Big Data challenges and opportunities in IoT Applications: Health Informatics and Smart Hospitals -- Healthcare Analysis in Smart Big Data Analytics :Reviews, Challenges and Recommendations -- Realization of IoT adaptive Data hiding system for Electronic Patient Record, Embedding in Medical Images -- A Swarm Intelligence Model for Enhancing Health Care Services in Internet of Things based Applications -- A Machine Learning Model for Predicting of Chronic Kidney Disease for Internet of Things and cloud computing Applications -- Part II: Secure Models for Smart Cities Applications -- Data Security Challenges in Smart cities -- Engineering Large Complex Critical Infrastructures of Future Smart Cities for IoT applications as Self-Adaptive Systems- Security challenges in IoT Cyber world -- Blockchains for Smart Cities: A Survey -- A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes towards a Secure Internet of Things based Application -- Part III: Secure Network Communication in Smart Cities Applications -- A Robust Watermarking Scheme Using Machine Learning Transmitted Over High-Speed Net-work for Internet of Things Applications -- 4, 8, 32, 64 bit Substitution Box generation using Irreducible or Reducible Polynomials over Galois Field GF(pq) -- Local Binary Patterns for Facial Expression Recognition for Efficient Smart Applications -- Efficient Generation of Association Rules from Numeric Data using Genetic Algorithm for Smart Cities Applications -- Online User Authentication System based on Finger Knuckle Print using Smartphones.
This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications. .
ISBN: 9783030015602
Standard No.: 10.1007/978-3-030-01560-2doiSubjects--Topical Terms:
568984
Computational intelligence.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Security in Smart Cities: Models, Applications, and Challenges
LDR
:04272nam a22004095i 4500
001
1013844
003
DE-He213
005
20200705004722.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030015602
$9
978-3-030-01560-2
024
7
$a
10.1007/978-3-030-01560-2
$2
doi
035
$a
978-3-030-01560-2
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Security in Smart Cities: Models, Applications, and Challenges
$h
[electronic resource] /
$c
edited by Aboul Ella Hassanien, Mohamed Elhoseny, Syed Hassan Ahmed, Amit Kumar Singh.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
VIII, 364 p. 150 illus., 84 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes in Intelligent Transportation and Infrastructure,
$x
2523-3440
505
0
$a
Part I: Challenges of Smart Healthcare Applications -- Big Data challenges and opportunities in IoT Applications: Health Informatics and Smart Hospitals -- Healthcare Analysis in Smart Big Data Analytics :Reviews, Challenges and Recommendations -- Realization of IoT adaptive Data hiding system for Electronic Patient Record, Embedding in Medical Images -- A Swarm Intelligence Model for Enhancing Health Care Services in Internet of Things based Applications -- A Machine Learning Model for Predicting of Chronic Kidney Disease for Internet of Things and cloud computing Applications -- Part II: Secure Models for Smart Cities Applications -- Data Security Challenges in Smart cities -- Engineering Large Complex Critical Infrastructures of Future Smart Cities for IoT applications as Self-Adaptive Systems- Security challenges in IoT Cyber world -- Blockchains for Smart Cities: A Survey -- A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes towards a Secure Internet of Things based Application -- Part III: Secure Network Communication in Smart Cities Applications -- A Robust Watermarking Scheme Using Machine Learning Transmitted Over High-Speed Net-work for Internet of Things Applications -- 4, 8, 32, 64 bit Substitution Box generation using Irreducible or Reducible Polynomials over Galois Field GF(pq) -- Local Binary Patterns for Facial Expression Recognition for Efficient Smart Applications -- Efficient Generation of Association Rules from Numeric Data using Genetic Algorithm for Smart Cities Applications -- Online User Authentication System based on Finger Knuckle Print using Smartphones.
520
$a
This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications. .
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Urban geography.
$3
560488
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Urban Geography / Urbanism (inc. megacities, cities, towns).
$3
1066410
650
2 4
$a
Security.
$3
1114130
700
1
$a
Hassanien, Aboul Ella.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
566871
700
1
$a
Elhoseny, Mohamed.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1228025
700
1
$a
Ahmed, Syed Hassan.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1102900
700
1
$a
Singh, Amit Kumar.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1199801
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030015596
776
0 8
$i
Printed edition:
$z
9783030015619
776
0 8
$i
Printed edition:
$z
9783030131852
830
0
$a
Lecture Notes in Intelligent Transportation and Infrastructure,
$x
2523-3440
$3
1302382
856
4 0
$u
https://doi.org/10.1007/978-3-030-01560-2
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入