6 results (0,12562 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Trust Management in the Internet of Vehicles

Trust Management in the Internet of Vehicles

The Internet of Vehicles (IoV) is referred to as an efficient and inevitable convergence of the Internet of Things intelligent transportation systems edge / fog and cloud computing and big data all of which could be intelligently harvested for the cooperative vehicular safety and non-safety applications as well as cooperative mobility management. A secure and low-latency communication is therefore indispensable to meet the stringent performance requirements of the safety-critical vehicular applications. Whilst the challenges surrounding low latency are being addressed by the researchers in both academia and industry it is the security of an IoV network which is of paramount importance as a single malicious message is perfectly capable enough of jeopardizing the entire networking infrastructure and can prove fatal for the vehicular passengers and the vulnerable pedestrians. This book thus investigates the promising notion of trust in a bid to strengthen the resilience of the IoV networks. It not only introduces trust categorically in the context of an IoV network i. e. in terms of its fundamentals and salient characteristics but further envisages state-of-the-art trust models and intelligent trust threshold mechanisms for segregating both malicious and non-malicious vehicles. Furthermore open research challenges and recommendations for addressing the same are discussed in the same too. | Trust Management in the Internet of Vehicles

GBP 48.99
1

Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Security privacy and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are again crucial for the effective performance of these systems. Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies as well as a wide range of examples and illustrations to effectively show the principles algorithms challenges and applications of security privacy and trust for IoT and CPS. Book features: Introduces new directions for research development and engineering security privacy and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles algorithms challenges and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security privacy and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers academics and practitioners from various national and international organizations and universities.

GBP 48.99
1

Field Guide to Compelling Analytics

Machine Learning Concepts Techniques and Applications

Machine Learning Concepts Techniques and Applications

Machine Learning: Concepts Techniques and Applications starts at basic conceptual level of explaining machine learning and goes on to explain the basis of machine learning algorithms. The mathematical foundations required are outlined along with their associations to machine learning. The book then goes on to describe important machine learning algorithms along with appropriate use cases. This approach enables the readers to explore the applicability of each algorithm by understanding the differences between them. A comprehensive account of various aspects of ethical machine learning has been discussed. An outline of deep learning models is also included. The use cases self-assessments exercises activities numerical problems and projects associated with each chapter aims to concretize the understanding. Features Concepts of Machine learning from basics to algorithms to implementation Comparison of Different Machine Learning Algorithms – When to use them & Why – for Application developers and Researchers Machine Learning from an Application Perspective – General & Machine learning for Healthcare Education Business Engineering Applications Ethics of machine learning including Bias Fairness Trust Responsibility Basics of Deep learning important deep learning models and applications Plenty of objective questions Use Cases Activity and Project based Learning Exercises The book aims to make the thinking of applications and problems in terms of machine learning possible for graduate students researchers and professionals so that they can formulate the problems prepare data decide features select appropriate machine learning algorithms and do appropriate performance evaluation. | Machine Learning Concepts Techniques and Applications

GBP 140.00
1

Social Computing and Virtual Communities

Social Computing and Virtual Communities

Growing more quickly than we can study or come to fully understand it social computing is much more than the next thing. Whether it is due more to technology-driven convenience or to the basic human need to find kindred connection online communication and communities are changing the way we live. Social Computing and Virtual Communities compiles contributions from international experts to offer the sort of multidisciplinary study that is required in any investigation of communities. Delving fully into theories and methods application areas and types of online social environments this book — Introduces several theories regarding online social interaction Provides a general overview of methodologies qualitative and quantitative for analyzing and evaluating virtual communities Makes an in-depth investigation into e-learning communities and the formation of social networks of learners Examines healthcare communities motivated by physical pain illness and burdensome symptoms Discusses intellectual property (IP) issues including those involving user-generated content Delves into the topic of online trust Introduces virtual communities in which users immerse themselves in a 3D virtual environment including MMORPG (massively multiplayer online role playing games) Presents an unusual community of older people of Chinese culture who perceive virtual communities as a place where old beliefs and traditional norms can be preserved Explores the rapid rise of social networking sites (SNS) Books of this kind are uncommon. This work not only provides case studies of different domains of virtual communities and different types of social technologies but also emphasizes theoretical and methodological aspects required to research and analyze such communities.

GBP 69.99
1

Trustworthy Cyber-Physical Systems Engineering

Trustworthy Cyber-Physical Systems Engineering

From the ForewordGetting CPS dependability right is essential to forming a solid foundation for a world that increasingly depends on such systems. This book represents the cutting edge of what we know about rigorous ways to ensure that our CPS designs are trustworthy. I recommend it to anyone who wants to get a deep look at these concepts that will form a cornerstone for future CPS designs. Phil Koopman Carnegie Mellon University Pittsburgh Pennsylvania USATrustworthy Cyber-Physical Systems Engineering provides practitioners and researchers with a comprehensive introduction to the area of trustworthy Cyber Physical Systems (CPS) engineering. Topics in this book cover questions such asWhat does having a trustworthy CPS actually mean for something as pervasive as a global-scale CPS?How does CPS trustworthiness map onto existing knowledge and where do we need to know more?How can we mathematically prove timeliness correctness and other essential properties for systems that may be adaptive and even self-healing?How can we better represent the physical reality underlying real-world numeric quantities in the computing system?How can we establish reason about and ensure trust between CPS components that are designed installed maintained and operated by different organizations and which may never have really been intended to work together? Featuring contributions from leading international experts the book contains sixteen self-contained chapters that analyze the challenges in developing trustworthy CPS and identify important issues in developing engineering methods for CPS. The book addresses various issues contributing to trustworthiness complemented by contributions on TCSP roadmapping taxonomy and standardization as well as experience in deploying advanced system engineering methods in industry. Specific approaches to ensuring trustworthiness namely proof and refinement are covered as well as engineering methods for dealing with hybrid aspects.

GBP 44.99
1