Электронная библиотека Финансового университета

     

Детальная информация

Advances in computer and electrical engineering (ACEE) book series.
Architecture and security issues in fog computing applications / [edited by] Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani. — 1 online resource (205 pages) : illustrations. — (Advances in computer and electrical engineering (ACEE) Book series). — <URL:http://elib.fa.ru/ebsco/2239359.pdf>.

Дата создания записи: 04.09.2019

Тематика: Cloud computing.; Cloud computing — Security measures.; Internet of things.; Cloud computing.; Internet of things.

Коллекции: EBSCO

Разрешенные действия:

Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети

Группа: Анонимные пользователи

Сеть: Интернет

Аннотация

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.

Права на использование объекта хранения

Место доступа Группа пользователей Действие
Локальная сеть Финуниверситета Все Прочитать Печать Загрузить
Интернет Читатели Прочитать Печать
-> Интернет Анонимные пользователи

Оглавление

  • Cover
  • Title Page
  • Copyright Page
  • Book Series
  • Table of Contents
  • Detailed Table of Contents
  • Preface
  • Acknowledgment
  • Chapter 1: Fog Resource Allocation Through Machine Learning Algorithm
  • Chapter 2: A Novel Resource Management Framework for Fog Computing by Using Machine Learning Algorithm
  • Chapter 3: Security Issues in Fog Computing for Internet of Things
  • Chapter 4: Analysis of Identity-Based Cryptography in Internet of Things (IoT)
  • Chapter 5: Cloud Security Architecture Based on Fully Homomorphic Encryption
  • Chapter 6: Object Detection in Fog Computing Using Machine Learning Algorithms
  • Chapter 7: Distributed Intelligence Platform to the Edge Computing
  • Chapter 8: Internet of Things and Fog Computing Applications in Intelligent Transportation Systems
  • Chapter 9: Agribot
  • Chapter 10: Towards Efficient Resource Management in Fog Computing
  • Compilation of References
  • About the Contributors
  • Index

Статистика использования

stat Количество обращений: 0
За последние 30 дней: 0
Подробная статистика