Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers /

This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and sele...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Mitton, Nathalie (Επιμελητής έκδοσης), Chaouchi, Hakima (Επιμελητής έκδοσης), Noel, Thomas (Επιμελητής έκδοσης), Watteyne, Thomas (Επιμελητής έκδοσης), Gabillon, Alban (Επιμελητής έκδοσης), Capolsini, Patrick (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2017.
Σειρά:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 190
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Comparative Analysis of Opportunistic Communication Technologies
  • Technical Overview of F-Interop
  • BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs
  • Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT
  • Providing Interoperability for Autonomic Control of Connected Devices
  • A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications
  • F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things
  • Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT
  • On the Performance of Key Pre-distribution for RPL-based IoT Networks
  • Formulating a Global Identifier Based on Actor Relationship for the Internet of Things
  • Framework of Cyber Attack Attribution Based on Threat Intelligence
  • UML Modeling of Cross-layer Attack in Wireless Sensor Networks
  • Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications
  • Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
  • Framework of Cyber Attack Attribution Based on Threat Intelligence.