LEADER 05380nam 22008175 450 001 9910254839503321 005 20200702234120.0 010 $a3-319-52727-4 024 7 $a10.1007/978-3-319-52727-7 035 $a(CKB)3710000001080150 035 $a(DE-He213)978-3-319-52727-7 035 $a(MiAaPQ)EBC6298721 035 $a(MiAaPQ)EBC5588999 035 $a(Au-PeEL)EBL5588999 035 $a(OCoLC)973881914 035 $a(PPN)198870019 035 $a(EXLCZ)993710000001080150 100 $a20170214d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInteroperability, Safety and Security in IoT $eSecond International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers /$fedited by Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (X, 139 p. 46 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v190 300 $aIncludes index. 311 $a3-319-52726-6 327 $aComparative Analysis of Opportunistic Communication Technologies -- Technical Overview of F-Interop -- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs -- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT -- Providing Interoperability for Autonomic Control of Connected Devices -- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications -- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things -- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT -- On the Performance of Key Pre-distribution for RPL-based IoT Networks -- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things -- Framework of Cyber Attack Attribution Based on Threat Intelligence -- UML Modeling of Cross-layer Attack in Wireless Sensor Networks -- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications -- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT -- Framework of Cyber Attack Attribution Based on Threat Intelligence. 330 $aThis book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT). 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v190 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aSoftware engineering 606 $aComputers, Special purpose 606 $aComputer security 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aSoftware engineering. 615 0$aComputers, Special purpose. 615 0$aComputer security. 615 14$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aSecurity. 615 24$aSoftware Engineering. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aSystems and Data Security. 676 $a004 702 $aMitton$b Nathalie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChaouchi$b Hakima$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNoel$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWatteyne$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGabillon$b Alban$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCapolsini$b Patrick$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254839503321 996 $aInteroperability, Safety and Security in IoT$92159195 997 $aUNINA