Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective (Englisch)
- Neue Suche nach: Bhushan, Bharat
- Neue Suche nach: Sahoo, G.
- Neue Suche nach: Gupta, Brij B.
- Neue Suche nach: Perez, Gregorio Martinez
- Neue Suche nach: Agrawal, Dharma P.
- Neue Suche nach: Gupta, Deepak
- Neue Suche nach: Bhushan, Bharat
- Neue Suche nach: Sahoo, G.
In:
Handbook of Computer Networks and Cyber Security
: Principles and Paradigms
;
Kapitel: 27
;
683-713
;
2020
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective
-
Beteiligte:Gupta, Brij B. ( Herausgeber:in ) / Perez, Gregorio Martinez ( Herausgeber:in ) / Agrawal, Dharma P. ( Herausgeber:in ) / Gupta, Deepak ( Herausgeber:in ) / Bhushan, Bharat ( Autor:in ) / Sahoo, G. ( Autor:in )
-
Erschienen in:Handbook of Computer Networks and Cyber Security : Principles and Paradigms ; Kapitel: 27 ; 683-713
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2020
-
Format / Umfang:31 pages
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Security Frameworks in Mobile Cloud ComputingVemulapalli, Chaitanya / Madria, Sanjay Kumar / Linderman, Mark et al. | 2020
- 2
-
An Investigation Study of Privacy Preserving in Cloud Computing EnvironmentManasrah, Ahmed M. / Shannaq, M. A. / Nasir, M. A. et al. | 2020
- 3
-
Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud Computing Case StudyJouini, Mouna / Arfa Rabai, Latifa Ben et al. | 2020
- 4
-
A Novel AckIBE-Based Secure Cloud Data Management FrameworkRamesh, Dharavath / Pasupuleti, Syam Kumar et al. | 2020
- 5
-
A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud PlatformsKale, Rahul Vishwanath / Veeravalli, Bharadwaj / Wang, Xiaoli et al. | 2020
- 6
-
Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their CountermeasuresVázquez-Ingelmo, A. / Moreno-Montero, Á. M. / García-Peñalvo, F. J. et al. | 2020
- 7
-
Security and Privacy Issues in Wireless Sensor and Body Area NetworksRoy, Moumita / Chowdhury, Chandreyee / Aslam, Nauman et al. | 2020
- 8
-
Preventing Security and Privacy Attacks in WBANsVyas, Avani / Pal, Sujata et al. | 2020
- 9
-
Underwater Wireless Sensor NetworksJain, Usha / Hussain, Muzzammil et al. | 2020
- 10
-
Security Issues in Cognitive Radio Ad Hoc NetworksMurmu, Mahendra Kumar / Singh, Awadhesh Kumar et al. | 2020
- 11
-
Security and Privacy in Social Networks: Data and Structural AnonymityJain, R. / Jain, N. / Nayyar, A. et al. | 2020
- 12
-
SOI FinFET for Computer Networks and Cyber Security SystemsJain, Neeraj / Raj, Balwinder et al. | 2020
- 13
-
Software-Defined Networking: A Novel Approach to NetworksBadotra, Sumit / Panda, S. N. et al. | 2020
- 14
-
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future DirectionsShaghaghi, Arash / Kaafar, Mohamed Ali / Buyya, Rajkumar / Jha, Sanjay et al. | 2020
- 15
-
Survey on DDoS Attack Techniques and Solutions in Software-Defined NetworkUbale, Tushar / Jain, Ankit Kumar et al. | 2020
- 16
-
Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) AttacksGulihar, Prachi / Gupta, B. B. et al. | 2020
- 17
-
Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce NetworkSamanta, Biswarup et al. | 2020
- 18
-
Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and SolutionsAlkatheiri, Mohammed Saeed / Sangi, Abdur Rashid / Anamalamudi, Satish et al. | 2020
- 19
-
Fog Computing: Applications and Secure Data AggregationRani, Sudesh / Saini, Poonam et al. | 2020
- 20
-
A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing EnvironmentPaharia, Bhumika / Bhushan, Kriti et al. | 2020
- 21
-
Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things NetworkStergiou, C. L. / Plageras, A. P. / Psannis, K. E. / Gupta, B. B. et al. | 2020
- 22
-
Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive StudyRicha / Sharma, T. P. / Sharma, Ajay Kumar et al. | 2020
- 23
-
A Systematic Review on Security and Privacy Issues in Mobile Devices and SystemsAlloghani, Mohamed / Baker, Thar / Al-Jumeily, Dhiya / Hussain, Abir / Mustafina, Jamila / Aljaaf, Ahmed J. et al. | 2020
- 24
-
Investigation of Security Issues in Distributed System MonitoringKotari, Manjunath / Chiplunkar, Niranjan N. et al. | 2020
- 25
-
An Analysis of Provable Security Frameworks for RFID SecurityTewari, Aakanksha / Gupta, B. B. et al. | 2020
- 26
-
Computational Techniques for Real-Time Credit Card Fraud DetectionMittal, Sangeeta / Tyagi, Shivani et al. | 2020
- 27
-
Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial PerspectiveBhushan, Bharat / Sahoo, G. et al. | 2020
- 28
-
Privacy Preservation of Electronic Health Record: Current Status and Future DirectionKumar, Anil / Kumar, Ravinder et al. | 2020
- 29
-
QKD Protocols Security Between Theory and Engineering ImplementationAmellal, Hicham / Meslouhi, Abdelmajid / Allati, Abderahim El / Haddadi, Anass El et al. | 2020
- 30
-
Survey of Security and Privacy Issues on Biometric SystemDatta, Priyanka / Bhardwaj, Shanu / Panda, S. N. / Tanwar, Sarvesh / Badotra, Sumit et al. | 2020
- 31
-
A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint BiometricsSarkar, Arpita / Singh, Binod Kumar et al. | 2020
- 32
-
Trees, Cryptosignatures, and Cyberspace Mobile Agent InterfacesNourani, C. F. et al. | 2020
- 33
-
Permutation–Substitution Based Image Encryption Algorithms Using Pseudorandom Number GeneratorsBhamidipati, Kishore / Annadurai, Soorya et al. | 2020
- 34
-
Recent Trends in Text Steganography with Experimental StudyKumar, Ravinder / Singh, Hitesh et al. | 2020
- 35
-
Machine Learning Based Intrusion Detection TechniquesGulla, Kishor Kumar / Viswanath, P. / Veluru, Suresh Babu / Kumar, R. Raja et al. | 2020
- 36
-
Feature Selection Using a Machine Learning to Classify a MalwareAl-Kasassbeh, Mouhammd / Mohammed, Safaa / Alauthman, Mohammad / Almomani, Ammar et al. | 2020
- 37
-
DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA DetectionVinayakumar, R. / Soman, K. P. / Poornachandran, Prabaharan et al. | 2020
- 38
-
ABFT: Analytics to Uplift Big Social Events Using Forensic ToolsDhaka, Priyanka / Nagpal, Bharti et al. | 2020
- 39
-
HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the LaboratoryAggarwal, Palvi / Gonzalez, Cleotilde / Dutt, Varun et al. | 2020