00848nam0 2200253 450 00001351120080625162219.00-7923-3091-920080625d1994----km-y0itay50------baengNLy-------001yy<<The>> dynamic systems of basic economic growth modelsby Bjarne S. JensenDordrechtKluwer1994c355 p.graf. e tab.24 cmMathematics and its applications3022001Mathematics and its applicationsTeoria e modelli della crescita economicaJensen,Bjarne S.631548ITUNIPARTHENOPE20080625RICAUNIMARC000013511111/2288156NAVA22008Dynamic systems of basic economic growth models1203483UNIPARTHENOPE00930nam a2200265 i 450099100279560970753620020503173506.0010704s1956 it ||| | ita b10415919-39ule_instEXGIL109978ExLBiblioteca Interfacoltàita811.3Whitman, Walt159715Foglie d'erba; e Prose /Walt Whitman ; traduzione di Enzo GiachinoTorino :Einaudi,1956XXXII, 955 p. ;21 cm.I millenni ;12Tit. orig.: Leaves of grassGiachino, Enzo.b1041591902-04-1427-06-02991002795609707536LE002 Fondo Bodini It. 25212002000992598le002-E0.00-no 00000.i1048424327-06-02Foglie d'erba; e Prose218858UNISALENTOle00201-01-01ma -itait 0103911nam 22006735 450 991064589260332120230117154721.03-031-24185-110.1007/978-3-031-24185-7(MiAaPQ)EBC7179471(Au-PeEL)EBL7179471(CKB)26027649400041(DE-He213)978-3-031-24185-7(PPN)267809344(EXLCZ)992602764940004120230117d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSecurity in Smart Home Networks /by Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen1st ed. 2023.Cham :Springer International Publishing :Imprint: Springer,2023.1 online resource (177 pages)Wireless Networks,2366-1445Print version: Meng, Yan Security in Smart Home Networks Cham : Springer International Publishing AG,c2023 9783031241840 Includes bibliographical references and index.Introduction -- Era of Smart Home -- Smart Home Network Architectures -- Security and Privacy Challenges in Smart Home -- Security Challenges and Requirements of Smart Home -- Mobile Device Layer: Privacy Breaches and Countermeasures -- Voice Interface Layer: Liveness Detections against Voice Spoofing -- Application Platform Layer: Anomaly Detection via Wireless Traffic Analysis -- Conclusion on Security and Privacy in Smart Home -- Conclusion.This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart home’s security and privacy issues.Wireless Networks,2366-1445TelecommunicationComputer networksData protectionComputational intelligenceCommunications Engineering, NetworksComputer Communication NetworksData and Information SecurityComputational IntelligenceTelecommunication.Computer networks.Data protection.Computational intelligence.Communications Engineering, Networks.Computer Communication Networks.Data and Information Security.Computational Intelligence.929.605643.60285Meng Yan1275813Zhu HaojinShen Xuemin (Sherman)MiAaPQMiAaPQMiAaPQBOOK9910645892603321Security in Smart Home Networks3251594UNINA