Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Internet of things : principles and paradigms
Bookmark Share

Text

Internet of things : principles and paradigms

Buyya, Rajkumar - Personal Name; Dastjerdi, Amir Vahid - Personal Name;

Contents:

Part I: IoT ecosystem concepts and architectures
Chapter 1: Internet of Things: an overview
1.1. Introduction
1.2. Internet of Things definition evolution
1.3. IoT architectures
1.4. Resource management
1.5. IoT data management and analytics
1.6. Communication protocols
1.7. Internet of Things applications
1.8. Security
1.9. Identity management and authentication
1.10. Privacy
1.11. Standardization and regulatory limitations
1.12. Conclusions

Chapter 2: Open source semantic web infrastructure for managing IoT resources in the Cloud
2.1. Introduction
2.2. Background/related work
2.3. OpenIoT architecture for IoT/cloud convergence
2.4. Scheduling process and IoT services lifecycle
2.5. Scheduling and resource management
2.6. Validating applications and use cases
2.7. Future research directions
2.8. Conclusions

Chapter 3: Device/Cloud collaboration framework for intelligence applications
3.1. Introduction
3.2. Background and related work
3.3. Device/cloud collaboration framework
3.4. Applications of device/cloud collaboration
3.5. Future work
3.6. Conclusions

Chapter 4: Fog Computing: principles, architectures, and applications
4.1. Introduction
4.2. Motivating scenario
4.3. Definitions and characteristics
4.4. Reference architecture
4.5. Applications
4.6. Research directions and enablers
4.7. Commercial products
4.8. Case study
4.9. Conclusions

Part II: IoT enablers and solutions
Chapter 5: Programming frameworks for Internet of Things
5.1. Introduction
5.2. Background
5.3. Survey of IoT programming frameworks
5.4. Future research directions
5.5. Conclusions

Chapter 6: Virtualization on embedded boards as enabling technology for the Cloud of Things
6.1. Introduction
6.2. Background
6.3. Virtualization and real-time
6.4. Experimental results
6.5. Future research directions
6.6. Conclusions

Chapter 7: Micro Virtual Machines (MicroVMs) for Cloud-assisted Cyber-Physical Systems (CPS)
7.1. Introduction
7.2. Related work
7.3. Architecture for deploying CPS in the Cloud and the expansion of the IoT
7.4. Extending the possibilities of the IoT by Cloud Computing
7.5. Micro Virtual Machines with the Sensor Observation Service, the path between smart objects and CPS
7.6. IoT architecture for selected use cases
7.7. Future research directions
7.8. Conclusions

Part III: IoT data and knowledge management
Chapter 8: Stream processing in IoT: foundations, state-of-the-art, and future directions
8.1. Introduction
8.2. The foundations of stream processing in IoT
8.3. Continuous Logic Processing System
8.4. Challenges and future directions
8.5. Conclusions

Chapter 9: A framework for distributed data analysis for IoT
9.1. Introduction
9.2. Preliminaries
9.3. Anomaly detection
9.4. Problem statement and definitions
9.5. Distributed anomaly detection
9.6. Efficient incremental local modeling
9.7. Summary

Part IV: IoT reliability, security, and privacy
Chapter 10: Security and privacy in the Internet of Things
10.1. Concepts
10.2. IoT security overview
10.3. Security frameworks for IoT
10.4. Privacy in IoT networks
10.5. Summary and conclusions

Chapter 11: Internet of Things—robustness and reliability
11.1. Introduction
11.2. IoT characteristics and reliability issues
11.3. Addressing reliability

Chapter 12: Governing Internet of Things: issues, approaches, and new paradigms
12.1. Introduction
12.2. Background and related work
12.3. IoT governance
12.4. Future research directions
12.5. Conclusions

Chapter 13: TinyTO: two-way authentication for constrained devices in the Internet of Things
13.1. Introduction
13.2. Security aspects and solutions
13.3. Design decisions
13.4. TinyTO protocol
13.5. Evaluation
13.6. Summary

Chapter 14: Obfuscation and diversification for securing the internet of things (IoT)
14.1. Introduction
14.2. Distinguishing characteristics of IoT
14.3. Obfuscation and diversification techniques
14.4. Enhancing the security in IoT using obfuscation and diversification techniques
14.5. Different use-case scenarios on software diversification and obfuscation
14.6. Conclusions and future work

Part V: IoT applications
Chapter 15: Applied Internet of Things
15.1. Introduction
15.2. Scenario
15.3. Architecture overview
15.4. Sensors
15.5. The gateway
15.6. Data transmission
15.7. Conclusions

Chapter 16: Internet of Vehicles and applications
16.1. Basics of IoV
16.2. Characteristics and challenges
16.3. Enabling technologies
16.4. Applications
16.5. Summary and future directions

Chapter 17: Cloud-Based Smart-Facilities Management
17.1. Introduction
17.2. Background and related work
17.3. A cloud-based architecture for smart-facility management
17.4. Middleware services
17.5. Resource management techniques for wireless sensor networks
17.6. Resource management techniques for supporting data analytics
17.7. Case study: management of sensor-based bridges
17.8. Case study: research collaboration platform for management of smart machinery
17.9. Conclusions

Index


Availability
#
Perpustakaan Poltek SSN (Rak 000) 004.22 BUY i
b0001315
Available - Available
#
Perpustakaan Poltek SSN (Rak 000) 004.22 BUY i/2
b0001876
Available - Available
Detail Information
Series Title
--
Call Number
004.22 BUY i
Publisher
Cambridge : Elsevier., 2017
Collation
xxiii, 354 hal.; ilus.; 25 cm
Language
English
ISBN/ISSN
9780128053959
Classification
004.22
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Internet
Computer Architecture
Embedded computer systems
Specific Detail Info
--
Statement of Responsibility
Rajkumar Buyya dan Amir Vahid Dastjerdi
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?