Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
3
result(s) for
"Kumar, Pardeep, 1976- editor"
Sort by:
Proceedings of International Conference on Smart Computing and Cyber Security : strategic foresight, security challenges and innovation (SMARTCYBER 2020)
by
International Conference on Smart Computing and Cyber Security (2020 : Department of Smart Computing, Kyungdong University, Global Campus, South Korea)
,
Pattnaik, Prasant Kumar, 1969- editor
,
Sain, Mangal, editor
in
Computer security Congresses.
,
Sécurité informatique Congrès.
,
Computer security.
The Smart Cyber Ecosystem for Sustainable Development
by
Pardeep Kumar, Vishal Jain, Vasaki Ponnusamy, Pardeep Kumar, Vishal Jain, Vasaki Ponnusamy
in
Computer networks-Social aspects
2021
The Smart Cyber Ecosystem for Sustainable Development
As the entire ecosystem is moving towards a sustainable goal, technology driven smart cyber system is the enabling factor to make this a success, and the current book documents how this can be attained.
The cyber ecosystem consists of a huge number of different entities that work and interact with each other in a highly diversified manner. In this era, when the world is surrounded by many unseen challenges and when its population is increasing and resources are decreasing, scientists, researchers, academicians, industrialists, government agencies and other stakeholders are looking toward smart and intelligent cyber systems that can guarantee sustainable development for a better and healthier ecosystem. The main actors of this cyber ecosystem include the Internet of Things (IoT), artificial intelligence (AI), and the mechanisms providing cybersecurity.
This book attempts to collect and publish innovative ideas, emerging trends, implementation experiences, and pertinent user cases for the purpose of serving mankind and societies with sustainable societal development. The 22 chapters of the book are divided into three sections: Section I deals with the Internet of Things, Section II focuses on artificial intelligence and especially its applications in healthcare, whereas Section III investigates the different cyber security mechanisms.
Audience
This book will attract researchers and graduate students working in the areas of artificial intelligence, blockchain, Internet of Things, information technology, as well as industrialists, practitioners, technology developers, entrepreneurs, and professionals who are interested in exploring, designing and implementing these technologies.
IoT Security
by
Ylianttila, Mika
,
Liyanage, Madhusanka
,
Braeken, An
in
Communication, Networking and Broadcast Technologies
,
Computing and Processing
,
Internet of things
2019,2020
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book: Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.