Linked e-resources
Details
Table of Contents
Chapter 1. IoT Network administration by intelligent decision support based on combined neural networks
Chapter 2. A Novel Privacy-Preserving Framework based on Blockchain Technology to Secure Industrial IoT Data
Chapter 3. Detecting Collusive Agents by Trust Measures in Social IoT Environments: A Novel Reputation Model
Chapter 4. An Adaptive Blurring Routing Protocol for Delay Tolerant Networks in IoT Environments
Chapter 5. Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks
Chapter 6. Machine learning methologies for preventing malware obfuscation
Chapter 7. Formation of Reliable Composite Teams for Collaborative Environmental Surveillance of Ecosystems
Chapter 8. Accountability of IoT devices
Chapter 9. Digital twin through physical assets tokenization in blockchain
Chapter 10. Security in Home Automation.
Chapter 2. A Novel Privacy-Preserving Framework based on Blockchain Technology to Secure Industrial IoT Data
Chapter 3. Detecting Collusive Agents by Trust Measures in Social IoT Environments: A Novel Reputation Model
Chapter 4. An Adaptive Blurring Routing Protocol for Delay Tolerant Networks in IoT Environments
Chapter 5. Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks
Chapter 6. Machine learning methologies for preventing malware obfuscation
Chapter 7. Formation of Reliable Composite Teams for Collaborative Environmental Surveillance of Ecosystems
Chapter 8. Accountability of IoT devices
Chapter 9. Digital twin through physical assets tokenization in blockchain
Chapter 10. Security in Home Automation.