Industrial Internet of Things : Cybermanufacturing Systems / / edited by Sabina Jeschke, Christian Brecher, Houbing Song, Danda B. Rawat |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (709 p.) |
Disciplina | 620 |
Collana | Springer Series in Wireless Technology |
Soggetto topico |
Manufactures
Application software Electrical engineering Economic policy Management information systems Computer science Manufacturing, Machines, Tools, Processes Information Systems Applications (incl. Internet) Communications Engineering, Networks R & D/Technology Policy Management of Computing and Information Systems |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Industrial Internet of Things and Cyber Manufacturing Systems -- An Application Map for Cyber-Physical Systems -- Cyber-Physical Electronics Production -- Cyber-physical Systems Engineering for Manufacturing -- Model-Based Engineering of Supervisory Controllers for Cyber- Physical Systems -- Formal Verification of SystemC-based Cyber Components -- Evaluation Model for Assessment of Cyber-Physical Production Systems -- CPS-based Manufacturing with Semantic Object Memories and Service Orchestration for Industrie 4.0 Applications -- Integration of a knowledge database and machine vision within a robot-based CPS. |
Record Nr. | UNINA-9910136616203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in Computing and Communications [[electronic resource] ] : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (389 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data encryption (Computer science)
Application software Computer communication systems Computer security Computer networks - Security measures Computers Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Systems and Data Security Mobile and Network Security Computing Milieux |
ISBN | 981-15-4825-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange. |
Record Nr. | UNISA-996465461703316 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (389 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data encryption (Computer science)
Application software Computer communication systems Computer security Computer networks - Security measures Computers Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Systems and Data Security Mobile and Network Security Computing Milieux |
ISBN | 981-15-4825-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange. |
Record Nr. | UNINA-9910410044903321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in Computing and Communications : 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers / / edited by Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXV, 708 p. 282 illus.) |
Disciplina | 327.73 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Computer networks - Security measures Application software Cryptology Systems and Data Security Computer Communication Networks Mobile and Network Security Information Systems Applications (incl. Internet) Security Services |
ISBN | 981-13-5826-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910350235003321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in Computing and Communications : Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings / / edited by Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 442 p. 197 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer communication systems E-commerce Systems and Data Security Computer Communication Networks e-Commerce/e-business |
ISBN | 3-662-44966-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and privacy in networked systems -- Authentication and access control systems -- Encryption and cryptography -- System and network security -- Work-in-progress. |
Record Nr. | UNINA-9910298977103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Technologies for Sustainable and Resilient Ecosystems [[electronic resource] ] : 3rd EAI International Conference, Edge-IoT 2022, and 4th EAI International Conference, SmartGov 2022, Virtual Events, November 16-18, 2022, Proceedings / / edited by Sérgio Ivan Lopes, Paula Fraga-Lamas, Tiago M. Fernándes-Camáres, Babu R. Dawadi, Danda B. Rawat, Subarna Shakya |
Autore | Lopes Sérgio Ivan |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (183 pages) |
Disciplina | 005.1 |
Altri autori (Persone) |
Fraga-LamasPaula
Fernándes-CamáresTiago M DawadiBabu R RawatDanda B ShakyaSubarna |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Software engineering
Operating systems (Computers) Application software Computer networks Computer Networks Software Engineering Operating Systems Computer and Information Systems Applications Computer Communication Networks |
ISBN | 3-031-35982-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Edge-IoT Applications: A Cost-Effective Thermal Imaging Safety Sensor for Industry 5.0 and Collaborative Robotics -- Edge Computing With Low-Cost Cameras For Object Detection In Smart Farming -- Evaluating Maximum Operating Distance in COTS RFID TAGS for Smart Manufacturing -- IoT Architectures, Forecasting and Adversarial Training: Stock Direction Forecasting Utilizing Technical, Fundamental, and News Sentiment Data -- IoT Architectures for Indoor Radon Management: a Prospective Analysis -- Adversarial Training for Better Robustness -- Artificial Intelligence and Machine Learning for smart governance: Integrating Computer Vision and Crowd Sourcing to Infer Drug Use on Streets: A Case Study with 311 Data in San Francisco -- Machine learning approach to crisis management exercise analysis: A case study in SURE project -- Quantitative Evaluation of Saudi E-government Websites Using a Web Structure Mining Methodology -- Extracting Digital Biomarkers for Unobtrusive Stress State Screening from Multimodal Wearable Data -- Smart Transportation: Continuous Measurement of Air Pollutant Concentrations in a Roadway Tunnel in Southern Italy -- Rating Urban Transport Services Quality Using a Sentiment Analysis Approach. |
Record Nr. | UNISA-996546819503316 |
Lopes Sérgio Ivan | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Technologies for Sustainable and Resilient Ecosystems : 3rd EAI International Conference, Edge-IoT 2022, and 4th EAI International Conference, SmartGov 2022, Virtual Events, November 16-18, 2022, Proceedings / / edited by Sérgio Ivan Lopes, Paula Fraga-Lamas, Tiago M. Fernándes-Camáres, Babu R. Dawadi, Danda B. Rawat, Subarna Shakya |
Autore | Lopes Sérgio Ivan |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (183 pages) |
Disciplina | 005.1 |
Altri autori (Persone) |
Fraga-LamasPaula
Fernándes-CamáresTiago M DawadiBabu R RawatDanda B ShakyaSubarna |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Software engineering
Operating systems (Computers) Application software Computer networks Computer Networks Software Engineering Operating Systems Computer and Information Systems Applications Computer Communication Networks |
ISBN | 3-031-35982-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Edge-IoT Applications: A Cost-Effective Thermal Imaging Safety Sensor for Industry 5.0 and Collaborative Robotics -- Edge Computing With Low-Cost Cameras For Object Detection In Smart Farming -- Evaluating Maximum Operating Distance in COTS RFID TAGS for Smart Manufacturing -- IoT Architectures, Forecasting and Adversarial Training: Stock Direction Forecasting Utilizing Technical, Fundamental, and News Sentiment Data -- IoT Architectures for Indoor Radon Management: a Prospective Analysis -- Adversarial Training for Better Robustness -- Artificial Intelligence and Machine Learning for smart governance: Integrating Computer Vision and Crowd Sourcing to Infer Drug Use on Streets: A Case Study with 311 Data in San Francisco -- Machine learning approach to crisis management exercise analysis: A case study in SURE project -- Quantitative Evaluation of Saudi E-government Websites Using a Web Structure Mining Methodology -- Extracting Digital Biomarkers for Unobtrusive Stress State Screening from Multimodal Wearable Data -- Smart Transportation: Continuous Measurement of Air Pollutant Concentrations in a Roadway Tunnel in Southern Italy -- Rating Urban Transport Services Quality Using a Sentiment Analysis Approach. |
Record Nr. | UNINA-9910731458303321 |
Lopes Sérgio Ivan | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|