Buch, Englisch, 194 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 454 g
Buch, Englisch, 194 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 454 g
Reihe: Computational Intelligence Techniques
ISBN: 978-1-032-13527-4
Verlag: CRC Press
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable.
Key features:
- Focuses on the computational intelligence techniques of security system design
- Covers applications and algorithms of discussed computational intelligence techniques
- Includes convergence-based and enterprise integrated security systems with their applications
- Explains emerging laws, policies, and tools affecting the landscape of cyber security
- Discusses application of sensors toward the design of security systems
This book will be useful for graduate students and researchers in electrical, computer
engineering, security system design and engineering.
Zielgruppe
Academic
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Elektronik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Wirtschaftswissenschaften Betriebswirtschaft Management
- Technische Wissenschaften Energietechnik | Elektrotechnik Elektrotechnik
Weitere Infos & Material
1. Analysis of Various Security Defence Frameworks in Different Application Areas of Cyber-Physical System. 2. Role and Development of Security Architecture and Models in Software Systems. 3. Role of IoT in the Design of a Security System. 4. IoT-Tangle Enhanced Security Systems. 5. Recent Trends in 5G and Machine Learning, Challenges and Opportunities. 6. Hardware Trojans in Microfluidic Biochips: Principles and Practice. 7. Benefits & Risks of Cloud Computing. 8. Intrusion Detection Systems for Trending Cyber-Attacks. 9. War of Control Hijacking: Attacks and Defenses. 10. IOT Based Lightweight Cryptographic Schemes.