Cybersecurity
portes grátis
Cybersecurity
Ambient Technologies, IoT, and Industry 4.0 Implications
Kumar, Gautam; Singh, Om Prakash; Saini, Hemraj
Taylor & Francis Ltd
10/2024
222
Mole
9780367702175
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
1.General and Specific Security Services, Risks and its Modeling
2.Vulnerability and Attack Detection Techniques: Intrusion Detection System
3.Digital Right Management in Computing Environment
4.Tradeoffs and Vulnerabilities in IoT & Cloud Secure Computing
5.Location and Availability Protections in Smart Mobility
6.Digital Forensics Cryptography with Smart Intelligence
7.Transmission Modelling on Malware Attack through Internet of Things
8.Rice plant disease detection using IoT
9.Secure Protocols for Biomedical Smart Devices
10.Access Control Mechanism in Healthcare Information System
11.Privacy Preservation tools and Techniques in Artificial Intelligence
12.Web Security Vulnerabilities: Identification, Exploitation and Mitigation
2.Vulnerability and Attack Detection Techniques: Intrusion Detection System
3.Digital Right Management in Computing Environment
4.Tradeoffs and Vulnerabilities in IoT & Cloud Secure Computing
5.Location and Availability Protections in Smart Mobility
6.Digital Forensics Cryptography with Smart Intelligence
7.Transmission Modelling on Malware Attack through Internet of Things
8.Rice plant disease detection using IoT
9.Secure Protocols for Biomedical Smart Devices
10.Access Control Mechanism in Healthcare Information System
11.Privacy Preservation tools and Techniques in Artificial Intelligence
12.Web Security Vulnerabilities: Identification, Exploitation and Mitigation
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
IoT Device;Crypotography;DoS Attack;Big Data;IoT Platform;Smart-Grid;Intrusion Detection Systems;Signcryption;Digital Forensics;Data-Intensive Security;IoT Network;Privacy;NSL;Endemic Equilibrium Point;DoS;SQL Injection;Multi-objective PSO;Arduino UNO;Smart City;Endemic Equilibrium;Smart Mobility;Intrusion Detection;Bell LaPadula Model;PSO;Health Care Information System;PSO Algorithm;Access Control Mechanism;Equilibrium Point;Vulnerable Web Application;Quantum PSO;RBAC
1.General and Specific Security Services, Risks and its Modeling
2.Vulnerability and Attack Detection Techniques: Intrusion Detection System
3.Digital Right Management in Computing Environment
4.Tradeoffs and Vulnerabilities in IoT & Cloud Secure Computing
5.Location and Availability Protections in Smart Mobility
6.Digital Forensics Cryptography with Smart Intelligence
7.Transmission Modelling on Malware Attack through Internet of Things
8.Rice plant disease detection using IoT
9.Secure Protocols for Biomedical Smart Devices
10.Access Control Mechanism in Healthcare Information System
11.Privacy Preservation tools and Techniques in Artificial Intelligence
12.Web Security Vulnerabilities: Identification, Exploitation and Mitigation
2.Vulnerability and Attack Detection Techniques: Intrusion Detection System
3.Digital Right Management in Computing Environment
4.Tradeoffs and Vulnerabilities in IoT & Cloud Secure Computing
5.Location and Availability Protections in Smart Mobility
6.Digital Forensics Cryptography with Smart Intelligence
7.Transmission Modelling on Malware Attack through Internet of Things
8.Rice plant disease detection using IoT
9.Secure Protocols for Biomedical Smart Devices
10.Access Control Mechanism in Healthcare Information System
11.Privacy Preservation tools and Techniques in Artificial Intelligence
12.Web Security Vulnerabilities: Identification, Exploitation and Mitigation
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
IoT Device;Crypotography;DoS Attack;Big Data;IoT Platform;Smart-Grid;Intrusion Detection Systems;Signcryption;Digital Forensics;Data-Intensive Security;IoT Network;Privacy;NSL;Endemic Equilibrium Point;DoS;SQL Injection;Multi-objective PSO;Arduino UNO;Smart City;Endemic Equilibrium;Smart Mobility;Intrusion Detection;Bell LaPadula Model;PSO;Health Care Information System;PSO Algorithm;Access Control Mechanism;Equilibrium Point;Vulnerable Web Application;Quantum PSO;RBAC