LEADER 03111nam 22006015 450 001 9910737299303321 005 20220915184505.0 010 $a3-030-01566-1 024 7 $a10.1007/978-3-030-01566-4 035 $a(CKB)4100000006999551 035 $a(MiAaPQ)EBC5540908 035 $a(DE-He213)978-3-030-01566-4 035 $a(PPN)231462786 035 $a(EXLCZ)994100000006999551 100 $a20181003d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUbiquitous Computing and Computing Security of IoT$b[electronic resource] /$fedited by N. Jeyanthi, Ajith Abraham, Hamid Mcheick 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (132 pages) 225 1 $aStudies in Big Data,$x2197-6503 ;$v47 311 $a3-030-01565-3 327 $aSecurity Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future. 330 $aThis provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future. 410 0$aStudies in Big Data,$x2197-6503 ;$v47 606 $aComputational intelligence 606 $aData protection 606 $aBig data 606 $aArtificial intelligence 606 $aComputational Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/T11014 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aBig Data$3https://scigraph.springernature.com/ontologies/product-market-codes/I29120 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aComputational intelligence. 615 0$aData protection. 615 0$aBig data. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aSecurity. 615 24$aBig Data. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aJeyanthi$b N$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAbraham$b Ajith$f1968-$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMcheick$b Hamid$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910737299303321 996 $aUbiquitous Computing and Computing Security of IoT$93459242 997 $aUNINA