Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers /
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and sele...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
Σειρά: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
190 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Comparative Analysis of Opportunistic Communication Technologies
- Technical Overview of F-Interop
- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs
- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT
- Providing Interoperability for Autonomic Control of Connected Devices
- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications
- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things
- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT
- On the Performance of Key Pre-distribution for RPL-based IoT Networks
- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things
- Framework of Cyber Attack Attribution Based on Threat Intelligence
- UML Modeling of Cross-layer Attack in Wireless Sensor Networks
- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications
- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
- Framework of Cyber Attack Attribution Based on Threat Intelligence.