Shopping cart
Your cart empty!
Terms of use dolor sit amet consectetur, adipisicing elit. Recusandae provident ullam aperiam quo ad non corrupti sit vel quam repellat ipsa quod sed, repellendus adipisci, ducimus ea modi odio assumenda.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Do you agree to our terms? Sign up
This book addresses a broad range of topics concerning machine learning, big data, the Internet of things (IoT), and security in the IoT. Its goal is to bring together several innovative studies on these areas, in order to help researchers, engineers, and designers in several interdisciplinary domains pursue related applications. It presents an overview of the various algorithms used, focusing on the advantages and disadvantages of each in the fields of machine learning and big data. It also covers next-generation computing paradigms that are expected to support wireless networking with high data transfer rates and autonomous decision-making capabilities.
In turn, the book discusses IoT applications (e.g. healthcare applications) that generate a huge amount of sensor data and imaging data that must be handled correctly for further processing. In the traditional IoT ecosystem, cloud computing offers a solution for the efficient management of huge amounts of data, thanks to its ability to access shared resources and provide a common infrastructure in a ubiquitous manner. Though these new technologies are invaluable, they also reveal serious IoT security challenges. IoT applications are vulnerable to various types of attack such as eavesdropping, spoofing and false data injection, the man-in-the-middle attack, replay attack, denial-of-service attack, jamming attack, flooding attack, etc. These and other security issues in the Internet of things are explored in detail.
In addition to highlighting outstanding research and recent advances from around the globe, the book reports on current challenges and future directions in the IoT. Accordingly, it offers engineers, professionals, researchers, and designers an applied-oriented resource to support them in a broad range of interdisciplinary areas.
Comments