|
|
|
|
LEADER |
03245nam a22004695i 4500 |
001 |
978-3-319-52727-7 |
005 |
20191027162822.0 |
007 |
cr nn 008mamaa |
008 |
170214s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319527277
|
024 |
7 |
|
|a 10.1007/978-3-319-52727-7
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Interoperability, Safety and Security in IoT
|b Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers /
|c edited by Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini.
|
250 |
|
|
|a 1st ed. 2017.
|
260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a X, 139 p. 46 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|v 190
|
505 |
0 |
|
|a Comparative Analysis of Opportunistic Communication Technologies -- Technical Overview of F-Interop -- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs -- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT -- Providing Interoperability for Autonomic Control of Connected Devices -- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications -- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things -- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT -- On the Performance of Key Pre-distribution for RPL-based IoT Networks -- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things -- Framework of Cyber Attack Attribution Based on Threat Intelligence -- UML Modeling of Cross-layer Attack in Wireless Sensor Networks -- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications -- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT -- Framework of Cyber Attack Attribution Based on Threat Intelligence.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
700 |
1 |
|
|a Mitton, Nathalie.
|e editor.
|
700 |
1 |
|
|a Chaouchi, Hakima.
|e editor.
|
700 |
1 |
|
|a Noel, Thomas.
|e editor.
|
700 |
1 |
|
|a Watteyne, Thomas.
|e editor.
|
700 |
1 |
|
|a Gabillon, Alban.
|e editor.
|
700 |
1 |
|
|a Capolsini, Patrick.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-52727-7
|