001442420 000__ 03757cam\a2200613\i\4500 001442420 001__ 1442420 001442420 003__ OCoLC 001442420 005__ 20230310003417.0 001442420 006__ m\\\\\o\\d\\\\\\\\ 001442420 007__ cr\un\nnnunnun 001442420 008__ 211013s2022\\\\sz\a\\\\o\\\\\000\0\eng\d 001442420 019__ $$a1275426798$$a1276778621$$a1276851620$$a1287769294 001442420 020__ $$a9783030854287$$q(electronic bk.) 001442420 020__ $$a3030854280$$q(electronic bk.) 001442420 020__ $$z9783030854270 001442420 020__ $$z3030854272 001442420 0247_ $$a10.1007/978-3-030-85428-7$$2doi 001442420 035__ $$aSP(OCoLC)1275358440 001442420 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dN$T$$dDCT$$dOCLCO$$dOCLCQ$$dOCLCO$$dOCLCA$$dOCLCQ 001442420 049__ $$aISEA 001442420 050_4 $$aTK5105.8857$$b.S43 2022 001442420 08204 $$a005.8$$223 001442420 24500 $$aSecurity and privacy preserving for IoT and 5G networks :$$btechniques, challenges, and new directions /$$cAhmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Brij B. Gupta, editors. 001442420 264_1 $$aCham :$$bSpringer,$$c[2022] 001442420 264_4 $$c©2022 001442420 300__ $$a1 online resource :$$billustrations (chiefly color) 001442420 336__ $$atext$$btxt$$2rdacontent 001442420 337__ $$acomputer$$bc$$2rdamedia 001442420 338__ $$aonline resource$$bcr$$2rdacarrier 001442420 347__ $$atext file 001442420 347__ $$bPDF 001442420 4901_ $$aStudies in big data,$$x2197-6511 ;$$vvolume 95 001442420 5050_ $$aAuthentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks -- Data Security Challenges in Deep Neural Network for Healthcare IoT Systems -- Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio -- A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals -- Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems -- Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches. 001442420 506__ $$aAccess limited to authorized users. 001442420 520__ $$aThis book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks. 001442420 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 19, 2021). 001442420 650_0 $$aInternet of things$$xSecurity measures. 001442420 650_0 $$a5G mobile communication systems$$xSecurity measures. 001442420 650_6 $$aInternet des objets$$xSécurité$$xMesures. 001442420 650_6 $$aCommunications mobiles 5G$$xSécurité$$xMesures. 001442420 655_0 $$aElectronic books. 001442420 7001_ $$aAbd El-Latif, Ahmed A.,$$eeditor. 001442420 7001_ $$aAbd-El-Atty, Bassem,$$eeditor. 001442420 7001_ $$aVenegas-Andraca, Salvador Elías,$$eeditor. 001442420 7001_ $$aMazurczyk, Wojciech,$$eeditor. 001442420 7001_ $$aGupta, Brij,$$d1982-$$eeditor. 001442420 77608 $$iPrint version:$$z3030854272$$z9783030854270$$w(OCoLC)1261306380 001442420 830_0 $$aStudies in big data ;$$vv. 95.$$x2197-6511 001442420 852__ $$bebk 001442420 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-85428-7$$zOnline Access$$91397441.1 001442420 909CO $$ooai:library.usi.edu:1442420$$pGLOBAL_SET 001442420 980__ $$aBIB 001442420 980__ $$aEBOOK 001442420 982__ $$aEbook 001442420 983__ $$aOnline 001442420 994__ $$a92$$bISE