Managing Security Services in Heterogenous Networks
portes grátis
Managing Security Services in Heterogenous Networks
Confidentiality, Integrity, Availability, Authentication, and Access Control
Jeyanthi, N; Thandeeswaran, R.; Perumal, Thinagaran; Ma, Kun
Taylor & Francis Ltd
12/2022
186
Mole
Inglês
9780367647452
15 a 20 dias
453
Descrição não disponível.
1. Access Control Methods in Cloud Enabled Internet of Things 2. An Intelligent Weighted Fuzzy Cluster based Secure Routing Algorithm for Mobile Ad-hoc Networks 3. Ensuring Security through Trust in Mobile Adhoc Networks Using Soft Computing Methods 4. Proof of Virtue - Nonce Free Hash Generation in Blockchain 5. Password Authentication Using Keystroke Biometric 6. Health Care Data Analytics over BigData 7. Bluetooth: state of the Art, Taxonomy, and Open issues for managing security services in heterogeneous networks
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
SVM Model;Access control;Fuzzy Petri Nets;CIA;Ad Hoc Networks;Heterogenous network;IoT Device;Password authentication;Malicious Node;Cloud-enabled internet of things;IoT Data;MANETs;Bluetooth Devices;Mac Address;Keystroke Dynamics;EHR Data;QoS Metric;Packet Delivery Ratio;IoT System;Trust Scores;Bluetooth Security;Access Control Policies;Consensus Algorithms;Healthcare Data;Membership Function;Fuzzy Rules;Target Device;Access Control Methods;Healthcare Data Analytics;Biomedical Signal Analysis
1. Access Control Methods in Cloud Enabled Internet of Things 2. An Intelligent Weighted Fuzzy Cluster based Secure Routing Algorithm for Mobile Ad-hoc Networks 3. Ensuring Security through Trust in Mobile Adhoc Networks Using Soft Computing Methods 4. Proof of Virtue - Nonce Free Hash Generation in Blockchain 5. Password Authentication Using Keystroke Biometric 6. Health Care Data Analytics over BigData 7. Bluetooth: state of the Art, Taxonomy, and Open issues for managing security services in heterogeneous networks
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
SVM Model;Access control;Fuzzy Petri Nets;CIA;Ad Hoc Networks;Heterogenous network;IoT Device;Password authentication;Malicious Node;Cloud-enabled internet of things;IoT Data;MANETs;Bluetooth Devices;Mac Address;Keystroke Dynamics;EHR Data;QoS Metric;Packet Delivery Ratio;IoT System;Trust Scores;Bluetooth Security;Access Control Policies;Consensus Algorithms;Healthcare Data;Membership Function;Fuzzy Rules;Target Device;Access Control Methods;Healthcare Data Analytics;Biomedical Signal Analysis