Secure Edge Computing

Secure Edge Computing

Applications, Techniques and Challenges

Haskell-Dowland, Paul; Ahmed, Mohiuddin

Taylor & Francis Ltd

10/2024

280

Mole

9781032056326

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
Section I. 1. Secure Fog-Cloud of Things: Architectures, Opportunities, and Challenges 2. Collaborative and Integrated Edge Security Architecture 3. A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing 4. Security and Organizational Strategy: A Cloud and Edge Computing Perspective 5. An Overview of Cognitive Internet of Things: Cloud, Fog and Edge Computing 6. Privacy of Edge Computing and IoT Section II. 7. Reducing Attack Surface of Edge Computing IoT Networks via Hybrid Routing using Dedicated Nodes 8. Early Identification of Mental Health Disorder Employing Machine Learning-based Secure Edge Analytics: A Real-time Monitoring System 9. Harnessing Artificial Intelligence for Secure ECG Analytics at the Edge for Cardiac Arrhythmia Classification 10. On Securing Electronic Healthcare Records Using Hyperledger Fabric Across the Network Edge 11. AI-Aided Secured ECG Live Edge Monitoring System with a Practical Use-Case Section III.12. Application of Unmanned Aerial Vehicles in Wireless Networks: Mobile Edge Computing and Caching 13. Vehicular Edge Computing Security Section III. 14. On Exploiting Blockchain Technology to Approach toward Secured, Sliced, and Edge Deployed Virtual Network Functions for Improvised IoT Services. 15. Usage of Blockchain for Edge Computing.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Edge Computing;IoT Device;Security;Fog Computing;Cyber Security;Edge Devices;Applications;Blockchain Technology;Edge Servers;IoT Network;Edge Nodes;MEC;Smart Contract;Sensitive Information;Cloud Servers;IoT System;IoT Ecosystem;Random Forest Model;RF;Machine Learning Models;Fog Devices;Packet Filtering;IoT Application;Cc;IoT Sensor;Network Edges;IoT Security;Network Slices