MARC details
000 -LEADER |
fixed length control field |
02292nam a22002897a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230622204104.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230622b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783030854270 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
0 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 ABD |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) |
Edition number |
0 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Abd El-Latif, Ahmed A |
245 ## - TITLE STATEMENT |
Title |
Security and privacy preserving for IoT and 5G networks : |
Remainder of title |
techniques, challenges, and new directions |
Statement of responsibility, etc. |
Ahmed A. Abd El-Latif (Editor), Bassem Abd-El-Atty (Editor), Salvador Elías Venegas-Andraca (Editor), Wojciech Mazurczyk (Editor), Brij Gupta (Editor) |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cham |
Name of publisher, distributor, etc. |
Springer |
Date of publication, distribution, etc. |
2022 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
278 pages |
Dimensions |
30 cm |
490 ## - SERIES STATEMENT |
Series statement |
Studies in big data |
Volume/sequential designation |
95 |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks<br/>Data Security Challenges in Deep Neural Network for Healthcare IoT Systems<br/>Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio<br/>A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals<br/>Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems<br/>Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.<br/> |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Engineering |
General subdivision |
Data processing |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Embedded computer systems |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Big data |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computational intelligence |
843 ## - REPRODUCTION NOTE |
Type of reproduction |
Photocopy |
887 ## - NON-MARC INFORMATION FIELD |
Source of data |
CamTech Library |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
Suppress in OPAC |
No |