Securing IoT and Big Data

Securing IoT and Big Data

Next Generation Intelligence

Poongodi, T.; Anpalagan, Alagan; Saravanan, Vijayalakshmi; Khan, Firoz

Taylor & Francis Ltd

12/2020

170

Dura

Inglês

9780367432881

15 a 20 dias

403

Descrição não disponível.
1. Basic Foundation of IoT and Big Data. 2. Security Model and Architecture for Big Data and IoT. 3. Security Technologies for Collecting, Sharing and Analysis of Big Data. 4. Intrusion Detection and Transmission Surveillance of IoT and Big Data.
5. Big Data and IoT Forensics. 6. Storage, System Security and Access Control for Big Data IoT. 7. Human Computer Interaction Challenges for Big Data and IoT Security. 8. Scalability and Auditing in Big Data and IoT Networks. 9. Cyber Threat Intelligence in Big Data and IoT Networks. 10. Internet of Things (IoT) Devices and Protocols Security. 11. Cross-Domain Trust Management in Smart Communities. 12. Cloud Computing-Based Security Solutions for IoT Data Analytics. 13. Security Challenges and Mitigation Approaches for Smart Cities. 14. Cyber-Attacks Detection and Prevention Systems for Big Data IoT Networks. 15. Interoperable Security for Urban Planning and Applications. 16. Ethics, Legal, and Social Considerations in IoT and Big Data Security. 17. Secure Integration of IoT and Cloud Computing 18. Secure Integration of IoT, Big Data and Social Networks. 19. Security and Privacy Preserving Data Mining and Aggregation in IoT Applications. 20. Sustainable Intrusion Detection, Prevention and Analysis for IoT Networks. 21. Big Data Malicious Programs Detection, Preservation and Analysis.
22. Privacy in IoT, Big Data Applications and Services.
IoT Device;Big Data;Cyber Attack;IoT System;Cloud Computing;IoT Application;Data Mining;IoT Security;Trust Management;Fog Computing;Smart Communities;IoT Gadget;Human Computer Interaction;IoT Node;Cyber Threat Intelligence;Communication technologies;IoT Gateway;Security algorithms;Smart Contracts;Blockchain;Digital Forensics;Internet of Things;Homomorphic Encryption;Ml Algorithm;IoT Ecosystem;Blockchain Technology;ECG Signal;Differential Privacy;Recommendation System;Random Forest Algorithm;Edge Computing;Random Forest;Industrial IoT;Cipher Text;Cyber Threats