001435708 000__ 05643cam\a2200601\i\4500 001435708 001__ 1435708 001435708 003__ OCoLC 001435708 005__ 20230309003949.0 001435708 006__ m\\\\\o\\d\\\\\\\\ 001435708 007__ cr\un\nnnunnun 001435708 008__ 210413s2021\\\\si\\\\\\ob\\\\000\0\eng\d 001435708 019__ $$a1284939306 001435708 020__ $$a9789813349964$$q(electronic bk.) 001435708 020__ $$a9813349964$$q(electronic bk.) 001435708 020__ $$z9789813349957 001435708 020__ $$z9813349956 001435708 0247_ $$a10.1007/978-981-33-4996-4$$2doi 001435708 035__ $$aSP(OCoLC)1245921379 001435708 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCO$$dOCLCF$$dUKAHL$$dOCLCO$$dQGK$$dVLB$$dOCLCQ$$dOCLCO$$dCOM$$dN$T$$dFAU$$dOCLCQ 001435708 049__ $$aISEA 001435708 050_4 $$aQA76.5915$$b.S43 2021eb 001435708 08204 $$a005.8$$223 001435708 24500 $$aSecurity issues and privacy threats in smart ubiquitous computing /$$cParikshit N. Mahalle, Gitanjali R. Shinde, Nilanjan Dey, Aboul Ella Hassanien, editors. 001435708 264_1 $$aSingapore :$$bSpringer,$$c[2021] 001435708 264_4 $$c©2021 001435708 300__ $$a1 online resource (xxi, 246, C1 pages) 001435708 336__ $$atext$$btxt$$2rdacontent 001435708 337__ $$acomputer$$bc$$2rdamedia 001435708 338__ $$aonline resource$$bcr$$2rdacarrier 001435708 4901_ $$aStudies in systems, decision and control,$$x2198-4182 ;$$vvolume 341 001435708 504__ $$aIncludes bibliographical references. 001435708 50500 $$gPart I.$$tThreats and Issues in Ubiquitous Computing --$$tIntroduction --$$tTaxonomy of threats to ubiquitous computing --$$tCyber Crime and Their Restriction Through Laws and Techniques for Protecting Security Issues and Privacy Threats --$$tRecent challenges in IoT --$$tData Acquisition and Knowledge Management in IoT: Security Issues, Challenges, and Road Map Ahead --$$gPart II.$$tSecurity Measures and Frameworks --$$tOAuth-Based Authorization and Delegation in Smart Home for the Elderly Using Decentralized Identifiers and Verifiable Credentials --$$tDynamic Access Control Solution for Cross-Tenancy in a Cloud Environment --$$tDistributed Access Control Scheme for Machine-to-Machine Communication in IoT Using Trust Factor --$$tGame Theory Approach for Trust Management in the Realm of IoT --$$tRansomware Attack Detection and Prevention for Android Devices --$$tA Comparative Analysis of Machine Deep Learning Algorithms for Intrusion Detection in WSN --$$tBase for Trust Score Estimation for Device to Device Communication in Internet of Thing Using Fuzzy Approach and Machine Learning --$$tSystematic Review of Resource Allocation Methods Using Scheduling for M2M (Machine to Machine Communication) in IoT Network --$$gPart III.$$tSocial Aspects of Smart Ubiquitous Computing --$$tSarcasm Detection in Online Social Network: Myths, Realities, and Issues --$$tFarmer-Assistive Chatbot in Indian Context Using Learning Techniques --$$tCorrection to: A Comparative Analysis of Machine Enep Learning Algorithms for Intrusion Entection in WSN. 001435708 5050_ $$aTaxonomy of Threats to Ubiquitous Computing -- Cyber Crime and Their Restriction through Laws and Techniques for Protecting Security Issues and Privacy Threats -- Data Acquisition and Knowledge Management in IoT: Security Issues, Challenges and Road Map ahead -- Dynamic Access control Solution for Cross-tenancy in a Cloud Environment -- Game Theory Approach for Trust Management in the realm of IoT -- A Comparative Analysis of Machine and Deep Learning Algorithms for Intrusion Detection in WSN -- Sarcasm Detection in Online Social Network Myths, Realities and Issues -- Farmer assistive chatbot in Indian context using learning techniques. 001435708 506__ $$aAccess limited to authorized users. 001435708 520__ $$aThis book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding. 001435708 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 19, 2021). 001435708 650_0 $$aUbiquitous computing. 001435708 650_0 $$aComputer security. 001435708 650_6 $$aInformatique omniprésente. 001435708 650_6 $$aSécurité informatique. 001435708 655_0 $$aElectronic books. 001435708 7001_ $$aMahalle, Parikshit N.,$$eeditor. 001435708 7001_ $$aShinde, Gitanjali Rahul,$$d1983-$$eeditor. 001435708 7001_ $$aDey, Nilanjan,$$d1984-$$eeditor. 001435708 7001_ $$aHassanien, Aboul Ella,$$eeditor. 001435708 77608 $$iPrint version:$$tSecurity issues and privacy threats in smart ubiquitous computing.$$dSingapore : Springer, [2021]$$z9813349956$$z9789813349957$$w(OCoLC)1206231725 001435708 830_0 $$aStudies in systems, decision and control ;$$vv. 341.$$x2198-4182 001435708 852__ $$bebk 001435708 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-33-4996-4$$zOnline Access$$91397441.1 001435708 909CO $$ooai:library.usi.edu:1435708$$pGLOBAL_SET 001435708 980__ $$aBIB 001435708 980__ $$aEBOOK 001435708 982__ $$aEbook 001435708 983__ $$aOnline 001435708 994__ $$a92$$bISE