Interoperability, safety and security in Iot : Second International Conference, Interiot 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016 revised selected papers
著者
書誌事項
Interoperability, safety and security in Iot : Second International Conference, Interiot 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016 revised selected papers
(Lecture notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering / editorial board, Ozgur Akan ... [et al.], 190)
Springer, c2012
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Other editors: Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini
Includes bibliographical references and index
内容説明・目次
内容説明
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016.
The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
目次
Comparative Analysis of Opportunistic Communication Technologies.- Technical Overview of F-Interop.- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs.- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT.- Providing Interoperability for Autonomic Control of Connected Devices.- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications.- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things.- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT.- On the Performance of Key Pre-distribution for RPL-based IoT Networks.- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things.- Framework of Cyber Attack Attribution Based on Threat Intelligence.- UML Modeling of Cross-layer Attack in Wireless Sensor Networks.- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications.- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT.- Framework of Cyber Attack Attribution Based on Threat Intelligence.
「Nielsen BookData」 より