03111nam 22006015 450 991073729930332120220915184505.03-030-01566-110.1007/978-3-030-01566-4(CKB)4100000006999551(MiAaPQ)EBC5540908(DE-He213)978-3-030-01566-4(PPN)231462786(EXLCZ)99410000000699955120181003d2019 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierUbiquitous Computing and Computing Security of IoT[electronic resource] /edited by N. Jeyanthi, Ajith Abraham, Hamid Mcheick1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (132 pages)Studies in Big Data,2197-6503 ;473-030-01565-3 Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future.This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.Studies in Big Data,2197-6503 ;47Computational intelligenceData protectionBig dataArtificial intelligenceComputational Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/T11014Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Big Datahttps://scigraph.springernature.com/ontologies/product-market-codes/I29120Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Computational intelligence.Data protection.Big data.Artificial intelligence.Computational Intelligence.Security.Big Data.Artificial Intelligence.005.8Jeyanthi Nedthttp://id.loc.gov/vocabulary/relators/edtAbraham Ajith1968-edthttp://id.loc.gov/vocabulary/relators/edtMcheick Hamidedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910737299303321Ubiquitous Computing and Computing Security of IoT3459242UNINA