Smart Secure Systems – IoT and Analytics Perspective

Smart Secure Systems – IoT and Analytics Perspective
Author: Guru Prasadh Venkataramani
Publisher: Springer
Total Pages: 345
Release: 2017-12-16
Genre: Computers
ISBN: 9811076359

This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017. The 20 full papers and 7 short papers presented were carefully reviewed and selected from 117 submissions. They feature research on the Internet of Things (IoT) and are organized in the following topical sections: IoT enabling technologies; IoT security; social IoT; web of things; and IoT services and applications.

Transforming the Internet of Things for Next-Generation Smart Systems

Transforming the Internet of Things for Next-Generation Smart Systems
Author: Alankar, Bhavya
Publisher: IGI Global
Total Pages: 173
Release: 2021-06-04
Genre: Computers
ISBN: 1799875431

The internet of things (IoT) has massive potential to transform current business models and enhance human lifestyles. With the current pace of research, IoT will soon find many new horizons to touch. IoT is now providing a base of technological advancement in various realms such as pervasive healthcare, smart homes, smart cities, connected logistics, automated supply chain, manufacturing units, and many more. IoT is also paving the path for the emergence of the digital revolution in industrial technology, termed Industry 4.0. Transforming the Internet of Things for Next-Generation Smart Systems focuses on the internet of things (IoT) and how it is involved in modern day technologies in a variety of domains. The chapters cover IoT in sectors such as agriculture, education, business and management, and computer science applications. The multi-disciplinary view of IoT provided within this book makes it an ideal reference work for IT specialists, technologists, engineers, developers, practitioners, researchers, academicians, and students interested in how IoT will be implemented in the next generation of smart systems and play an integral role in advancing technology in the future.

Handbook of Research on Big Data and the IoT

Handbook of Research on Big Data and the IoT
Author: Kaur, Gurjit
Publisher: IGI Global
Total Pages: 602
Release: 2019-03-29
Genre: Computers
ISBN: 1522574336

The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.

Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 837
Release: 2021-02-05
Genre: Technology & Engineering
ISBN: 1799886018

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

Machine Learning and Cognitive Science Applications in Cyber Security

Machine Learning and Cognitive Science Applications in Cyber Security
Author: Khan, Muhammad Salman
Publisher: IGI Global
Total Pages: 338
Release: 2019-05-15
Genre: Computers
ISBN: 1522581014

In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines of cognitive science applications have been found to have significant applications in the domain of cyber security. Machine Learning and Cognitive Science Applications in Cyber Security examines different applications of cognition that can be used to detect threats and analyze data to capture malware. Highlighting such topics as anomaly detection, intelligent platforms, and triangle scheme, this publication is designed for IT specialists, computer engineers, researchers, academicians, and industry professionals interested in the impact of machine learning in cyber security and the methodologies that can help improve the performance and reliability of machine learning applications.

Research Anthology on Machine Learning Techniques, Methods, and Applications

Research Anthology on Machine Learning Techniques, Methods, and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 1516
Release: 2022-05-13
Genre: Computers
ISBN: 1668462923

Machine learning continues to have myriad applications across industries and fields. To ensure this technology is utilized appropriately and to its full potential, organizations must better understand exactly how and where it can be adapted. Further study on the applications of machine learning is required to discover its best practices, challenges, and strategies. The Research Anthology on Machine Learning Techniques, Methods, and Applications provides a thorough consideration of the innovative and emerging research within the area of machine learning. The book discusses how the technology has been used in the past as well as potential ways it can be used in the future to ensure industries continue to develop and grow. Covering a range of topics such as artificial intelligence, deep learning, cybersecurity, and robotics, this major reference work is ideal for computer scientists, managers, researchers, scholars, practitioners, academicians, instructors, and students.

Cyber-Physical Systems for Social Applications

Cyber-Physical Systems for Social Applications
Author: Dimitrova, Maya
Publisher: IGI Global
Total Pages: 460
Release: 2019-04-03
Genre: Computers
ISBN: 1522578803

Present day sophisticated, adaptive, and autonomous (to a certain degree) robotic technology is a radically new stimulus for the cognitive system of the human learner from the earliest to the oldest age. It deserves extensive, thorough, and systematic research based on novel frameworks for analysis, modelling, synthesis, and implementation of CPSs for social applications. Cyber-Physical Systems for Social Applications is a critical scholarly book that examines the latest empirical findings for designing cyber-physical systems for social applications and aims at forwarding the symbolic human-robot perspective in areas that include education, social communication, entertainment, and artistic performance. Highlighting topics such as evolinguistics, human-robot interaction, and neuroinformatics, this book is ideally designed for social network developers, cognitive scientists, education science experts, evolutionary linguists, researchers, and academicians.

DevOps for Trustworthy Smart IoT Systems

DevOps for Trustworthy Smart IoT Systems
Author: Nicolas Ferry
Publisher:
Total Pages:
Release: 2021-07-31
Genre:
ISBN: 9781680838244

ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU. The overall goal of the ENACT project was to provide a novel set of solutions to enable DevOps in the realm of trustworthy Smart IoT Systems. Smart IoT Systems (SIS) are complex systems involving not only sensors but also actuators with control loops distributed all across the IoT, Edge and Cloud infrastructure. Since smart IoT systems typically operate in a changing and often unpredictable environment, the ability of these systems to continuously evolve and adapt to their new environment is decisive to ensure and increase their trustworthiness, quality and user experience. DevOps has established itself as a software development life-cycle model that encourages developers to continuously bring new features to the system under operation without sacrificing quality. This book reports on the ENACT work to empower the development and operation as well as the continuous and agile evolution of SIS, which is necessary to adapt the system to changes in its environment, such as newly appearing trustworthiness threats.

Applying Integration Techniques and Methods in Distributed Systems and Technologies

Applying Integration Techniques and Methods in Distributed Systems and Technologies
Author: Kecskemeti, Gabor
Publisher: IGI Global
Total Pages: 368
Release: 2019-04-12
Genre: Computers
ISBN: 1522582967

Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. Applying Integration Techniques and Methods in Distributed Systems is a critical scholarly publication that defines the current state of distributed systems, determines further goals, and presents architectures and service frameworks to achieve highly integrated distributed systems and presents solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting topics such as multimedia, programming languages, and smart environments, this book is ideal for system administrators, integrators, designers, developers, researchers, and academicians.

Interdisciplinary Approaches to Information Systems and Software Engineering

Interdisciplinary Approaches to Information Systems and Software Engineering
Author: Mukherjee, Alok Bhushan
Publisher: IGI Global
Total Pages: 320
Release: 2019-04-30
Genre: Computers
ISBN: 1522577858

It is now more important than ever to implement approaches and methods that can be effective in extracting meaningful information from large data sets. Although data sets may be available for different aspects of society, we may not assess the intrinsic characteristics of their behavior effectively. Additionally, frameworks are needed that can store, process, and represent the data in such a manner that can be of practical significance. Interdisciplinary Approaches to Information Systems and Software Engineering is an essential reference publication that assesses the significance of robust information systems in characterizing events of varying nature and dimensions. Additionally, the book includes studies on the development and application of decision-making and prediction modeling frameworks using different approaches such as agent-based modeling, spatial decision support systems, and spatial data mining. Covering topics such as management information systems, knowledge discovery, and mathematical analysis, this book is ideal for professionals, researchers, and academicians in various disciplines including computer science, information technology, geographical information systems, remote sensing, and earth system sciences.