Security and privacy preserving for IoT and 5G networks : (Record no. 1185)

MARC details
000 -LEADER
fixed length control field 02292nam a22002897a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230622204104.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230622b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030854270
040 ## - CATALOGING SOURCE
Transcribing agency 0
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 ABD
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Edition number 0
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Abd El-Latif, Ahmed A
245 ## - TITLE STATEMENT
Title Security and privacy preserving for IoT and 5G networks :
Remainder of title techniques, challenges, and new directions
Statement of responsibility, etc. Ahmed A. Abd El-Latif (Editor), Bassem Abd-El-Atty (Editor), Salvador Elías Venegas-Andraca (Editor), Wojciech Mazurczyk (Editor), Brij Gupta (Editor)
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cham
Name of publisher, distributor, etc. Springer
Date of publication, distribution, etc. 2022
300 ## - PHYSICAL DESCRIPTION
Extent 278 pages
Dimensions 30 cm
490 ## - SERIES STATEMENT
Series statement Studies in big data
Volume/sequential designation 95
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks<br/>Data Security Challenges in Deep Neural Network for Healthcare IoT Systems<br/>Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio<br/>A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals<br/>Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems<br/>Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches
520 ## - SUMMARY, ETC.
Summary, etc. This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.<br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Engineering
General subdivision Data processing
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded computer systems
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Big data
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computational intelligence
843 ## - REPRODUCTION NOTE
Type of reproduction Photocopy
887 ## - NON-MARC INFORMATION FIELD
Source of data CamTech Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     CamTech Library CamTech Library STEM & Engineering 06/22/2023   005.8 ABD 0000001517 06/22/2023 C.1 06/22/2023 Books