دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Shivani Agarwal, Sandhya Makkar, Duc-Tan Tran سری: Internet of Everything (IoE): Security and Privacy Paradigm ISBN (شابک) : 2020020017, 9780429322969 ناشر: CRC Press سال نشر: 2020 تعداد صفحات: 235 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 17 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Privacy Vulnerabilities and Data Security Challenges in the IoT به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب آسیبپذیریهای حریم خصوصی و چالشهای امنیت داده در اینترنت اشیا نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب تکامل مسائل امنیتی و حریم خصوصی در اینترنت اشیا (IoT) را مورد بحث قرار می دهد. تمرکز این کتاب بر گردآوری تمام فناوریهای مرتبط با امنیت و حریم خصوصی در یک منبع واحد است تا دانشآموزان، محققان، دانشگاهیان و کسانی که در صنعت هستند بتوانند به راحتی مسائل امنیتی و حریم خصوصی اینترنت اشیا را درک کنند. این کتاب ویرایش شده استفاده از مهندسی امنیت و اصول حفظ حریم خصوصی به طراحی را برای طراحی یک اکوسیستم ایمن اینترنت اشیا و پیاده سازی راه حل های امنیت سایبری مورد بحث قرار می دهد. این کتاب خوانندگان را به سفری می برد که با درک مسائل امنیتی در فناوری های مجهز به اینترنت اشیاء و نحوه استفاده از آنها در بخش های مختلف آغاز می شود. خوانندگان را درگیر چالش های امنیتی و ایجاد زیرساخت ایمن برای دستگاه های اینترنت اشیا می کند. این کتاب به محققان و متخصصان کمک میکند تا معماری امنیتی اینترنت اشیا و پیشرفتهترین اقدامات مقابله با اینترنت اشیا را درک کنند. همچنین تهدیدات امنیتی در زیرساختهای مجهز به اینترنت اشیا را از شبکههای موقت یا زیرساختی سنتی متمایز میکند و بحثی جامع در مورد چالشها و راهحلهای امنیتی در RFID و WSN در اینترنت اشیا ارائه میدهد. هدف این کتاب برجسته کردن مفاهیم فناوریهای مرتبط و یافتههای جدید توسط محققان از طریق سازماندهی فصل است. مخاطبان اصلی شامل متخصصان، محققان، دانشجویان فارغ التحصیل، طراحان، کارشناسان و مهندسانی هستند که در مورد مسائل مربوط به امنیت تحقیق می کنند.
This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT security and privacy issues. This edited book discusses the use of security engineering and privacy-by-design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding security issues in IoT-enabled technologies and how these can be applied in various sectors. It walks readers through engaging with security challenges and building a safe infrastructure for IoT devices. The book helps researchers and practitioners understand the security architecture of IoT and the state-of-the-art in IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID and WSNs in IoT. This book aims to highlight the concepts of related technologies and novel findings by researchers through its chapter organization. The primary audience comprises specialists, researchers, graduate students, designers, experts, and engineers undertaking research on security-related issues.
Cover Half Title Series Page Title Page Copyright Page Dedication Table of Contents Preface Editors Contributors Chapter 1 Applications of Industrial Internet of Things (IIoT) 1.1 Introduction 1.1.1 Internet of Things 1.1.2 Machine-To-Machine (M2M) 1.1.3 Emergence and Growth of IoT 1.1.4 Setting up an IoT Infrastructure 1.2 Cloud System Selection 1.3 Platform Selection 1.4 IoT Applications in the Industry 1.4.1 Vehicle Telematics 1.4.2 Fleet 1.4.3 Connected Car 1.4.4 Leasing/Ride Sharing/Asset Management 1.4.5 Healthcare 1.4.6 IoT for Patients 1.4.7 Medical Adherence 1.4.8 IoT for Physicians 1.4.9 Blood Banks 1.4.10 Device Monitoring: Defibrillators/Heart Monitors/Pacemakers 1.4.11 IoT for Hospitals 1.4.12 IoT for Health Insurance Companies 1.4.13 Smart Metering 1.4.14 Smart House 1.4.15 Smart City 1.4.16 Renewable Solar Energy 1.4.17 Insurance 1.4.18 Enterprise Use Cases 1.4.19 Using Iot for a Better World 1.5 Security, Privacy, and the Internet of Things 1.5.1 Multiple Network 1.5.2 Multiple Types of Services 1.5.3 Scaling Growth 1.5.4 Automated Functionality 1.5.5 Long Lifecycles 1.5.6 Remote Updates 1.6 The Future of the Internet of Things 1.6.1 IoT Will Be Primary 1.6.2 Homes Will Get Smarter 1.6.3 Enterprises Will Start Using More IoT Bibliography Chapter 2 Biomedical Applications Using IoT 2.1 Introduction 2.1.1 According to Wikipedia 2.1.2 According to Techopedia 2.1.3 According to Trendmicro.com 2.1.4 According to Webopedia 2.2 History of IoT 2.3 How Does IoT Work? 2.4 Advantages of IoT 2.4.1 Communication 2.4.2 Information 2.4.3 Automation with Control 2.4.4 Monitoring 2.4.5 Time 2.4.6 Money 2.4.7 Efficient and Time-Saving 2.4.8 Improved Lifestyle 2.5 Disadvantages of IoT 2.5.1 Compatibility 2.5.2 Complexity 2.5.3 Privacy/Security 2.5.4 Safety 2.5.5 Staff Downsizing and Unemployment 2.6 How Big Is IoT? 2.6.1 Did You Know? 2.7 IoT Applications 2.7.1 Smarter Homes 2.7.2 Wearables 2.7.3 Smart City 2.7.4 Smart Electricity Grids 2.7.5 Industrial Internet 2.7.6 Connected Cars 2.7.7 Connected Healthcare 2.7.8 Smart Retail 2.7.9 Smart Supply Chains 2.7.10 Smart Farming 2.8 IoT in the Biomedical or Healthcare Sectors 2.9 Why Healthcare? 2.10 Applications of IoT in Healthcare 2.10.1 Remote Healthcare/Patient Monitoring 2.10.2 Wearables 2.10.3 Patient-Specific Medicines 2.10.4 Equipment Availability and Maintenance 2.10.5 Medical Asset Monitoring and Better Patient Care 2.10.6 Data Management 2.10.7 Smart Beds 2.10.8 Diabetes Management 2.10.9 Help for the Paralyzed 2.10.10 Senior Monitoring 2.11 Biomedical Devices and Apps in IoT 2.11.1 Myo 2.11.2 Zio 2.11.3 MyDario 2.11.4 SleepBot 2.11.5 GOJO 2.11.6 Weka 2.11.7 Apple App to Manage Depression with Smart Watch 2.11.8 Health Application by Intel 2.11.9 YuGo 2.11.10 Sensimed 2.11.11 MoMeKardia 2.11.12 Quell 2.11.13 SmartPump 2.11.14 Withings Thermo 2.11.15 Trak 2.12 Benefits of IoT in Healthcare 2.12.1 Economic Benefits 2.12.2 Reduced Risk of Errors 2.12.3 Solution to Problem of Distance 2.12.4 Better Treatment Outcomes 2.12.5 Better Disease Control 2.12.6 More Trust Towards Doctors 2.12.7 Easy Control of Medicines 2.12.8 Maintenance of Connected Devices 2.13 Drawbacks of IoT in Healthcare 2.13.1 Privacy Issues for Patients 2.13.2 Accidental Failures 2.13.3 Malware 2.13.4 Lack of Encryption 2.14 Conclusion References Chapter 3 Emerging Technological Advances in Healthcare 3.1 Introduction 3.2 Vision and Engineering of IoT 3.3 Current Patterns and Uses of IoT in Medical Services 3.3.1 Persistent Monitoring and Healthcare Delivery: The First Step of IoT Healthcare Ladder 3.3.2 What Therapeutic Gadgets Can Be Associated Utilizing the Social Insurance IoT Arrangement? 3.4 Case Study for IoT in Healthcare 3.5 Difficulties Faced by IoT in Human Services or Healthcare 3.5.1 How Practical Is It to Actualize IoT Medical Services Arrangements? 3.6 The Future of IoT in Human Healthcare 3.7 Conclusion References Chapter 4 The Internet of Things (IoT) and Contactless Payments: An Empirical Analysis of the Healthcare Industry 4.1 What Are IoT Payments? 4.1.1 Advantages of IoT in Healthcare 4.1.2 Advantages of Digital Payment for Healthcare Services 4.2 Literature Review 4.2.1 Technology Acceptance Model (TAM) 4.2.1.1 Perceived Convenience 4.2.1.2 Perceived Ease of Use 4.2.1.3 Conceptual Framework and Propositions 4.3 Proposed System 4.3.1 Proposed Architecture 4.3.2 Patient Position Device 4.3.2.1 Sensors to Measure Body Temperature 4.3.2.2 Sensors to Measure Heart Rate 4.3.3 Recommended Design 4.3.3.1 Implementation 4.3.3.2 Importance in the Healthcare Sector 4.3.3.3 Instamed and Its Digital Pockets Offering 4.3.3.4 Med Rec and Its Offering 4.3.3.5 Process Changes 4.3.4 Methodology 4.3.4.1 Research Design 4.3.4.2 Questionnaire Design 4.3.5 Hypothesis 4.3.6 Data Analysis and Design 4.4 Results 4.5 Discussion and Conclusion 4.6 Limitations 4.7 Conclusion 4.8 Findings Bibliography Chapter 5 AI in Healthcare 5.1 Global Research Update on AI in Healthcare 5.2 Scope of AI in Healthcare 5.3 Data Analytics (Machine Learning, Deep Learning Algorithms) 5.4 Medical Imaging (MRI, CT, Ultrasound, and Other Imaging Techniques) 5.5 Cancer Detection, Disease Management, and Drug Discovery 5.5.1 AI in Oncology 5.5.2 Detection Using AI 5.5.3 Disease Characterization Using AI 5.5.4 Monitoring of Disease Using AI 5.6 Challenges for AI in Healthcare 5.7 Future Prospects 5.8 Healthcare in 2019 and Beyond: Five AI Trends to Watch 5.8.1 The Internet of Medical Things (IoMT) 5.8.2 Telemedicine 5.8.3 Wearables in Healthcare 5.8.4 Chatbots 5.8.5 Cloud Computing 5.9 AI in Healthcare: An Innovation and Opportunity in Disguise 5.10 The Story beyond 2019 5.10.1 AI-Powered Chips 5.10.2 IoT and AI 5.10.3 Automated Machine Learning 5.10.4 The Rise of Facial Recognition 5.10.5 Increased Automation 5.11 Limitations 5.12 Conclusions References Chapter 6 Security Vulnerabilities in the IoT 6.1 Introduction to IoT 6.2 Background 6.3 Advantages of IoT 6.4 Disadvantages of IoT 6.5 Reasons for IoT Devices’ Vulnerabilities 6.6 What Are IoT Devices and Services? 6.6.1 IoT Devices 6.6.2 Services of IoT 6.6.3 IoT Devices and Services: Security 6.7 Security and Safety Threats, Attacks, and Vulnerabilities 6.7.1 Vulnerability 6.7.2 Exposure 6.7.3 Threats 6.7.4 Attacks 6.8 Primary Security and Privacy Goals 6.8.1 Confidentiality 6.8.2 Integrity 6.8.3 Authentication and Authorization 6.8.4 Availability 6.8.5 Accountability 6.8.6 Auditing 6.8.7 Non-Repudiation 6.8.8 Privacy Goals 6.9 Intruders, Motivations, and Capabilities 6.9.1 Tools and Techniques Used by Intruders 6.9.2 Purpose and Motivation of Attack 6.9.3 Classification of Possible Intruders 6.9.3.1 Individuals 6.9.3.2 Organized Groups 6.9.3.3 Intelligence Agency 6.10 Discussion and Conclusions 6.10.1 Discussion 6.10.2 Conclusions References Chapter 7 Research on IoT Governance, Security, and Privacy Issues of Internet of Things 7.1 Introduction 7.1.1 Birth of IoT 7.1.2 Introduction to IoT 7.1.3 Edges of IoT 7.1.4 IoT Hardware 7.2 IoT across Numerous Domains 7.3 IoT Security Challenges 7.3.1 Famous IoT Security Breaches and IoT Hacks 7.3.2 IoT Security Apparatuses and Enactment 7.4 What Enterprises Are Most Helpless against IoT Security Dangers? 7.4.1 Step-by-Step Directions to Secure IoT Frameworks and Gadgets 7.5 Common IoT Safety Efforts 7.6 Difficulties for Privacy and Security in IoT 7.6.1 Security and Protection 7.7 Conclusion Bibliography Chapter 8 Recent Trends of IoT and Big Data in Research Problem-Solving 8.1 IoT Big Data Exploration, Storage, Processing, and Analytics 8.1.1 Data Exploration 8.1.2 Data Processing 8.1.2.1 Batch-Based Processing Technologies 8.1.2.2 Technologies Based on Stream Processing 8.1.2.3 Interactive Analysis 8.1.3 IoT Big Data Analytics Methods 8.1.3.1 Classification 8.1.3.2 Clustering 8.1.3.3 Association Rule 8.2 IoT Security 8.2.1 Authentication Technologies in IoT 8.2.2 Encryption and Key Management 8.2.3 Protocols 8.2.4 Challenges and Potential Future Trends in IoT Security 8.2.4.1 Object Identification 8.2.4.2 Authentication and Authorization 8.2.4.3 Privacy 8.2.4.4 Software Vulnerability Analysis 8.2.4.5 Malware in IoT 8.3 The Internet of Things and Social Networks 8.3.1 Basic Understanding of the Social Internet of Things (SIoT) 8.3.2 SIoT Research Trends 8.3.2.1 SIoT Paradigm 8.3.2.2 SIoT Architecture 8.3.2.3 SIoT Applications and Trends 8.4 Smart Cities and Applications 8.4.1 IoT Technologies for Smart Cities 8.4.1.1 Radio-Frequency Identification (RFID) 8.4.1.2 Wireless Sensor Networks (WSN) 8.4.1.3 Addressing 8.4.1.4 Middleware 8.4.2 IoT Actual Trends for Smart Cities 8.4.2.1 Smart Homes 8.4.2.2 Smart Parking Lots 8.4.2.3 Vehicular Traffic 8.4.2.4 Environmental Pollution 8.4.2.5 Surveillance Systems 8.4.2.6 Smart Energy and Smart Grids References Chapter 9 A Theoretical Context for CSF in Medical Software Next Release 9.1 Introduction 9.2 Background 9.2.1 Software NRP 9.2.2 Critical Success Factor Approach 9.3 Success Factors for NRP-Based Software Projects 9.4 Research Methodology 9.5 Data Analysis and Results 9.5.1 Exploratory Factor Analysis 9.5.1.1 Multiple Regression Model 9.5.2 Discussion 9.6 Conclusions 9.7 Limitations and Future Scope Appendix References Chapter 10 Robotics and Machine Learning 10.1 Introduction: Robotics and Machine Learning Cooperation 10.2 Machine Learning Approaches in Robotics 10.2.1 Computer Vision 10.2.2 Imitation Learning 10.2.3 Self-Supervised Learning 10.2.4 Assistive and Medical Technologies 10.2.5 Multi-Agent Learning 10.3 Research Trends in Robotics and Machine Learning 10.3.1 Challenge 1: Complicated Multi-Dimensional Motion 10.3.2 Challenge 2: Control Policies in Moving Landscape 10.3.3 Challenge 3: Advanced Manipulation 10.3.4 Challenge 4: Advanced Object Recognition 10.3.5 Challenge 5: Assessment and Forecasting of Human Motion 10.3.6 Challenge 6: Fusion of Sensors and Reduction in Dimensions 10.3.7 Challenge 7: High-Rated Task Planning 10.4 Robotics, an Emerging Field 10.4.1 Six Main Trends and Their Implications 10.4.1.1 Commercial Investments 10.4.1.2 Emergence of New International Players 10.4.1.3 Reduction in Hardware Costs 10.4.1.4 Popularity of Drones in the Civilian Sector 10.4.1.5 Cloud Robotics 10.4.1.6 Leveraging Social Media Data 10.5 Machine Learning Algorithms 10.5.1 Types of Machine Learning Algorithms 10.5.1.1 Supervised Learning Algorithms 10.5.1.2 Unsupervised Learning Algorithms 10.5.1.3 Reinforcement Learning 10.6 Data Science Helping Robotics 10.6.1 Data Science and Robotics 10.7 Impact of Machine Learning on Robotic Technologies 10.7.1 Machine Learning and Its Applications in Robotics 10.7.1.1 Computer Vision 10.7.1.2 Imitation Learning 10.7.1.3 Assistive and Medical Technologies 10.8 Learning Involving the Multi-Agent 10.8.1 Challenges 10.9 Conclusion Bibliography Chapter 11 Detecting Medical Reviews Using Sentiment Analysis 11.1 Introduction 11.2 Background 11.3 Data Transformation 11.4 Filtering 11.5 Lexicon-Based Method of Sentiment Analysis: Lexicon Construction 11.6 Classification 11.7 Evaluation 11.8 A Review of Sentiment Analysis 11.9 Performing Sentiment Analysis on Medical Reviews 11.10 Sentiment Analysis Working Program 11.11 Conclusion Bibliography Index