Security in IoT social networks:
Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searchi...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Amsterdam
Academic Press
2021
|
Schriftenreihe: | Intelligent data centric systems
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780128216033/?ar |
Zusammenfassung: | Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. |
Beschreibung: | Description based on CIP data; resource not viewed |
Umfang: | 1 Online-Ressource illustrations. |
ISBN: | 9780128216033 0128216034 9780128215999 0128215992 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104366257 | ||
003 | DE-627-1 | ||
005 | 20240701091155.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2021 xx |||||o 00| ||eng c | ||
020 | |a 9780128216033 |c ePub ebook |9 978-0-12-821603-3 | ||
020 | |a 0128216034 |9 0-12-821603-4 | ||
020 | |a 9780128215999 |c electronic bk. |9 978-0-12-821599-9 | ||
020 | |a 0128215992 |c electronic bk. |9 0-12-821599-2 | ||
035 | |a (DE-627-1)104366257 | ||
035 | |a (DE-599)KEP104366257 | ||
035 | |a (ORHE)9780128216033 | ||
035 | |a (DE-627-1)104366257 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 006.312 |2 23 | |
245 | 1 | 0 | |a Security in IoT social networks |c edited by Fadi Al-Turjman, B.D. Deebak |
264 | 1 | |a Amsterdam |b Academic Press |c 2021 | |
300 | |a 1 Online-Ressource |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Intelligent data centric systems | |
500 | |a Description based on CIP data; resource not viewed | ||
520 | |a Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. | ||
650 | 0 | |a Data mining | |
650 | 0 | |a Big data | |
650 | 0 | |a Computer security | |
650 | 0 | |a Internet of things | |
650 | 2 | |a Data Mining | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Exploration de données (Informatique) | |
650 | 4 | |a Données volumineuses | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Internet des objets | |
650 | 4 | |a Big data | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data mining | |
650 | 4 | |a Internet of things | |
700 | 1 | |a Al-Turjman, Fadi |e HerausgeberIn |4 edt | |
700 | 1 | |a Deebak, B. D. |e HerausgeberIn |4 edt | |
776 | 1 | |z 9780128215999 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128215999 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128216033/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104366257 |
---|---|
_version_ | 1821494931517079552 |
adam_text | |
any_adam_object | |
author2 | Al-Turjman, Fadi Deebak, B. D. |
author2_role | edt edt |
author2_variant | f a t fat b d d bd bdd |
author_facet | Al-Turjman, Fadi Deebak, B. D. |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104366257 (DE-599)KEP104366257 (ORHE)9780128216033 |
dewey-full | 006.312 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.312 |
dewey-search | 006.312 |
dewey-sort | 16.312 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03070nam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-104366257</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091155.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128216033</subfield><subfield code="c">ePub ebook</subfield><subfield code="9">978-0-12-821603-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128216034</subfield><subfield code="9">0-12-821603-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128215999</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-821599-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128215992</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-821599-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104366257</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104366257</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128216033</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104366257</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.312</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in IoT social networks</subfield><subfield code="c">edited by Fadi Al-Turjman, B.D. Deebak</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Academic Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Intelligent data centric systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on CIP data; resource not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Data Mining</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Exploration de données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Données volumineuses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Al-Turjman, Fadi</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Deebak, B. D.</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780128215999</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128215999</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128216033/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104366257 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:13Z |
institution | BVB |
isbn | 9780128216033 0128216034 9780128215999 0128215992 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Academic Press |
record_format | marc |
series2 | Intelligent data centric systems |
spelling | Security in IoT social networks edited by Fadi Al-Turjman, B.D. Deebak Amsterdam Academic Press 2021 1 Online-Ressource illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Intelligent data centric systems Description based on CIP data; resource not viewed Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. Data mining Big data Computer security Internet of things Data Mining Computer Security Exploration de données (Informatique) Données volumineuses Sécurité informatique Internet des objets Al-Turjman, Fadi HerausgeberIn edt Deebak, B. D. HerausgeberIn edt 9780128215999 Erscheint auch als Druck-Ausgabe 9780128215999 |
spellingShingle | Security in IoT social networks Data mining Big data Computer security Internet of things Data Mining Computer Security Exploration de données (Informatique) Données volumineuses Sécurité informatique Internet des objets |
title | Security in IoT social networks |
title_auth | Security in IoT social networks |
title_exact_search | Security in IoT social networks |
title_full | Security in IoT social networks edited by Fadi Al-Turjman, B.D. Deebak |
title_fullStr | Security in IoT social networks edited by Fadi Al-Turjman, B.D. Deebak |
title_full_unstemmed | Security in IoT social networks edited by Fadi Al-Turjman, B.D. Deebak |
title_short | Security in IoT social networks |
title_sort | security in iot social networks |
topic | Data mining Big data Computer security Internet of things Data Mining Computer Security Exploration de données (Informatique) Données volumineuses Sécurité informatique Internet des objets |
topic_facet | Data mining Big data Computer security Internet of things Data Mining Computer Security Exploration de données (Informatique) Données volumineuses Sécurité informatique Internet des objets |
work_keys_str_mv | AT alturjmanfadi securityiniotsocialnetworks AT deebakbd securityiniotsocialnetworks |