Interoperability, Safety and Security in IoT

Interoperability, Safety and Security in IoT
Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers
 Paperback
Print on Demand | Lieferzeit: Print on Demand - Lieferbar innerhalb von 3-5 Werktagen I

44,94 €* Paperback

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9783319527260
Veröffentl:
2017
Einband:
Paperback
Erscheinungsdatum:
15.02.2017
Seiten:
152
Autor:
Nathalie Mitton
Gewicht:
242 g
Format:
235x155x9 mm
Serie:
190, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Sprache:
Englisch
Beschreibung:

This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016.
The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
Includes supplementary material: sn.pub/extras
Comparative Analysis of Opportunistic Communication Technologies.- Technical Overview of F-Interop.- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs.- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT.- Providing Interoperability for Autonomic Control of Connected Devices.- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications.- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things.- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT.- On the Performance of Key Pre-distribution for RPL-based IoT Networks.- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things.- Framework of Cyber Attack Attribution Based on Threat Intelligence.- UML Modeling of Cross-layer Attack in Wireless Sensor Networks.- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications.- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT.- Framework of Cyber Attack Attribution Based on Threat Intelligence.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.