Industrial Internet of Things (IIoT). Группа авторов

Читать онлайн книгу.

Industrial Internet of Things (IIoT) - Группа авторов


Скачать книгу
Wang, B. et al., DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw., 81, 308–319, 2015.

      43. Alomar, N., Alsaleh, M., Alarifi, A., Social authentication applications, assaults, defense strategies and future research directions: a systematic review. IEEE Commun. Surv. Tutor., 19, 2, 1080–1111, 2017.

      44. He, D., Chan, S., Guizani, M., Mobile application security: malware threats and defenses. IEEE Wirel. Commun., 22, 1, 138–144, 2015.

      45. Vukalović, J. and Delija, D., Advanced persistent threats-detection and defense. 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), IEEE, 2015.

      46. Anwar, S. et al., From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms, 10, 2, 39, 2017.

      47. Lee, J.-Y., Lin, W.-C., Huang, Y.-H., A lightweight authentication protocol for internet of things. 2014 International Symposium on Next-Generation Electronics (ISNE), IEEE, 2014.

      48. Lina, Y., Lee, G., Kim, H., A Study on the Lora Systems. KICS Proceedings of Symposium of the Korean Institute of communications and Information Sciences, vol. 6, pp. 217–218, 2017.

      49. Garam, K., Ahn, H-b, Kim, G.-B., Lee, J.E., Lee, S.-M., Lee, J.-H., IoT service development starting with Thingplug, pageblue, Korea, Nov 2015.

      50. Underwood, S., Blockchain beyond bitcoin. Commun. ACM, 59, 15–17, Oct. 2016.

      51. How blockchain can change the future of IoT, 20 Novemver 2016, [Online]. Available: https://venturebeat.com/2016/11/20/how-blockchain-can-changethe-future-of-iot/. [Accessed 2018].

      52. Chiang, M. and Zhang, T., Fog and IoT: An overview of research opportunities. IEEE Internet Things J., 3, 854–864, Dec 2016.

      53. Munoz, R., Mangues-Bafalluy, J., Vilalta, R., Verikoukis, C., Alonso-Zarate, J., Bartzoudis, N., Georgiadis, A., Payaro, M., Perez-Neira, A., Casellas, R., Martinez, R., Nunez-Martinez, J., Esteso, M.R., Pubill, D., Font-Bach, O., Henarejos, P., Serra, J., Vazquez-Gallego, F., The cttc 5g end-to-end experimental platform: Integrating heterogeneous wireless/optical networks, distributed cloud, and IoT devices. IEEE Veh. Technol. Mag., 11, 50–63, Mar 2016.

      54. Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Renzo, M.D., Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun. Mag., 53, 20–27, April 2015.

      55. Xu, L., Xie, J., Xu, X., Wang, S., Enterprise lte and wifi interworking system and a proposed network selection solution, in: 2016 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 137–138, March 2016.

      56. Fog Computing and the Internet of Things: Extend, in: Cisco, [Online]. Available: http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf, pp. 5. [Accessed 2018].

      57. Rouse, M., Edge computing, August 2016, [Online]. Available: http://searchdatacenter.techtarget.com/definition/edge-computing. [Accessed 2018].

      1 *Corresponding author: [email protected]

      2 †Corresponding author: [email protected]

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7SrgUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAAAccAgAAAgAA ADhCSU0EJQAAAAAAEOjxXPMvwRihontnrcVk1bo4QklNBDoAAAAAAPcAAAAQAAAAAQAAAAAAC3By aW50T3V0cHV0AAAABQAAAABQc3RTYm9vbAEAAAAASW50ZWVudW0AAAAASW50ZQAAAABDbHJtAAAA D3ByaW50U2l4dGVlbkJpdGJvb2wAAAAAC3ByaW50ZXJOYW1lVEVYVAAAAAoAQQBkAG8AYgBlACAA UABEAEYAAAAAAA9wcmludFByb29mU2V0dXBPYmpjAAAADABQAHIAbwBvAGYAIABTAGUAdAB1AHAA AAAAAApwcm9vZlNldHVwAAAAAQAAAABCbHRuZW51bQAAAAxidWlsdGluUHJvb2YAAAAJcHJvb2ZD TVlLADhCSU0EOwAAAAACLQAAABAAAAABAAAAAAAScHJpbnRPdXRwdXRPcHRpb25zAAAAFwAAAABD cHRuYm9vbAAAAAAAQ2xicmJvb2wAAAAAAFJnc01ib29sAAAAAABDcm5DYm9vbAAAAAAAQ250Q2Jv b2wAAAAAAExibHNib29sAAAAAABOZ3R2Ym9vbAAAAAAARW1sRGJvb2wAAAAAAEludHJib29sAAAA AABCY2tnT2JqYwAAAAEAAAAAAABSR0JDAAAAAwAAAABSZCAgZG91YkBv4AAAAAAAAAAAAEdybiBk b3ViQG/gAAAAAAAAAAAAQmwgIGRvdWJAb+AAAAAAAAAAAABCcmRUVW50RiNSbHQAAAAAAAAAAAAA AABCbGQgVW50RiNSbHQAAAAAAAAAAAAAAABSc2x0VW50RiNQeGxAcsAAAAAAAAAAAAp2ZWN0b3JE YXRhYm9vbAEAAAAAUGdQc2VudW0AAAAAUGdQcwAAAABQZ1BDAAAAAExlZnRVbnRGI1JsdAAAAAAA AAAAAAAAAFRvcCBVbnRGI1JsdAAAAAAAAAAAAAAAAFNjbCBVbnRGI1ByY0BZAAAAAAAAAAAAEGNy b3BXaGVuUHJpbnRpbmdib29sAAAAAA5jcm9wUmVjdEJvdHRvbWxvbmcAAAAAAAAADGNyb3BSZWN0 TGVmdGxvbmcAAAAAAAAADWNyb3BSZWN0UmlnaHRsb25nAAAAAAAAAAtjcm9wUmVjdFRvcGxvbmcA AAAAADhCS

Скачать книгу