Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Mitton, Nathalie. (Editor ), Chaouchi, Hakima. (Editor ), Noel, Thomas. (Editor ), Watteyne, Thomas. (Editor ), Gabillon, Alban. (Editor ), Capolsini, Patrick. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 190
Materias:
Acceso en línea:https://doi.org/10.1007/978-3-319-52727-7
Tabla de Contenidos:
  • Comparative Analysis of Opportunistic Communication Technologies
  • Technical Overview of F-Interop
  • BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs
  • Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT
  • Providing Interoperability for Autonomic Control of Connected Devices
  • A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications
  • F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things
  • Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT
  • On the Performance of Key Pre-distribution for RPL-based IoT Networks
  • Formulating a Global Identifier Based on Actor Relationship for the Internet of Things
  • Framework of Cyber Attack Attribution Based on Threat Intelligence
  • UML Modeling of Cross-layer Attack in Wireless Sensor Networks
  • Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications
  • Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
  • Framework of Cyber Attack Attribution Based on Threat Intelligence.