Security in IoT Social Networks

Security in IoT Social Networks

This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.

Author: Fadi Al-Turjman

Publisher: Academic Press

ISBN: 9780128216033

Category: Science

Page: 266

View: 998

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. Provides several characteristics of social, network, and physical security associated with social information networks Presents the security mechanisms and events related to social information networks Covers emerging topics, such as network information structures like on-line social networks, heterogeneous and homogeneous information networks, and modern information networks Includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models
Categories: Science

Security Designs for the Cloud IoT and Social Networking

Security Designs for the Cloud  IoT  and Social Networking

Audience This book is directed to IT engineers, programmers, security professionals, and a wide array of interested hackers and device makers requiring an understanding of the vulnerabilities associated with the Internet of Things and cloud ...

Author: Dac-Nhuong Le

Publisher: John Wiley & Sons

ISBN: 9781119593201

Category: Computers

Page: 400

View: 771

Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.
Categories: Computers

Security Designs for the Cloud IoT and Social Networking

Security Designs for the Cloud  IoT  and Social Networking

Figure 8.5 Social network. Explicit social networks (e.g., Facebook,5 LinkedIn,6
Twitter7 and Myspace8) are where the users define the network by explicitly
connecting with other users, possibly, but not necessarily, based on shared
interests.

Author: Dac-Nhuong Le

Publisher: John Wiley & Sons

ISBN: 9781119592266

Category: Computers

Page: 300

View: 911

Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.
Categories: Computers

Securing Social Networks in Cyberspace

Securing Social Networks in Cyberspace

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites.

Author: Taylor & Francis Group

Publisher: CRC Press

ISBN: 0367681730

Category:

Page: 298

View: 578

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues and family; sharing and posting information; managing audio, video and photos; and all other aspects of using social media sites both professionally and personally. In the setting of Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. This book discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyber bullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats, will be considered in the book. This book can be used as a reference item for easy understanding of complex Cybersecurity issues in Social Network or Social Networking Services. It would be beneficial for the academicians and graduate level researchers mainly. Also, general readers may find it beneficial in protecting their social media related profiles.
Categories:

Iot Security Issues

Iot Security Issues

This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained.

Author: Alasdair Gilchrist

Publisher: Walter de Gruyter GmbH & Co KG

ISBN: 9781501505775

Category:

Page:

View: 470

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.
Categories:

Security and Privacy in Social Networks and Big Data

Security and Privacy in Social Networks and Big Data

This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019.

Author: Weizhi Meng

Publisher: Springer Nature

ISBN: 9789811507588

Category: Computers

Page: 276

View: 316

This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
Categories: Computers

Internet of Things and Big Data Analysis Recent Trends and Challenges

Internet of Things and Big Data Analysis  Recent Trends and Challenges

This work exhibits how the current 4G LTE-A frameworks can contribute to the design of smart cities. Furthermore, an overview of 4G and 5G is presented.

Author: Ali Al-Sabbagh

Publisher:

ISBN: 0692809929

Category:

Page: 304

View: 531

Chapter One: Overview of Internet of Things (IoT): This chapter describes the definition of IoT. The term Internet of Things (IoT) or Internet of Everything (IoE) is still ambiguous. There is no single unified definition of what it really is. However, it can be defined by elaborating what it can provide. The Internet of Things is thought to be the next evolution of the Internet as it provides a networking infrastructure allowing for trillions of devices to collect data and communicate with each other to make processed smart decisions. Chapter Two: Challenges and Applications of (IoT): This chapter discusses some of the major IoT applications that have the potential to bring transformation in our future trends. The rapid development of these applications is expected to face numerous challenges. This chapter brings key challenges into focus and discusses potential barriers that could impede the rapid adoption of IoT. Chapter Three: Explosion of Data (Big Data): This chapter elaborates on data management, which requires the process of transferring data in an efficient way, upon the user's demand. Therefore, the right data must reach the right user at the right time, in order to be valuable. Data comes from many different sources, i.e. web apps, sensor networks and many others. This data needs to be collected, categorized, stored, and analyzed in order to get an insight of its content and hence present it in an efficient way. Chapter Four: Boosted Prediction Analysis for Big Data: Prediction techniques represent a useful tool for knowledge discovery in a massive and complex healthcare dataset. In this chapter, a prediction model has been designed and implemented which analyzes medical records of patients and provides information for decision making in health institutes. The proposed model consists of three primary stages, the first being preprocessing data that focuses on preparing the information for the mining process. Chapter Five: IoT Security: This chapter outlines existing security approaches being used for IoT, together with the weaknesses they inherit. Since the security of IoT communications could be addressed in the context of the communication protocol itself, we focus on existing protocols and mechanisms used to secure communications involved in this vital subject. Chapter Six: Threat Taxonomy for Cloud of Things: In this chapter we present a comprehensive threat model which is then utilized to create a first-ever threat taxonomy for the Cloud of Things. This taxonomy outlines different security and privacy threats faced by this nascent technology and can be used as the basis for further research on security and privacy in the Cloud of Things. Chapter Seven: Smart Homes Based On Smart Cities' Design Patterns: This chapter reviews smart cities for the Internet of Things. It discusses maximizing the efficiency of distribution and consumption of energy from one point of view and a vision for smart cities in the future from another point of view. Moreover, it presents the design for a smart home and ends up with a proposed system, as a case study. Chapter Eight: Social-Sensor Networks: This chapter deals with the integration of Wireless Sensor Networks (WSNs) and Social Networks. Nowadays, WSNs have caused a paradigm shift in our society. They have become a popular mean of communication among people. Many aspects of our lives are significantly related to the WSNs, such as communication, transportation, military, and agriculture. Chapter Nine: 5G Driving Global IoT: This chapter explores the IoT literature in terms of the communication technology involved: 4G-LTE-A. Additionally, an outline for improving the IoT of future keys in current cellular systems is discussed. This work exhibits how the current 4G LTE-A frameworks can contribute to the design of smart cities. Furthermore, an overview of 4G and 5G is presented.
Categories:

Artificial Intelligence and Security Challenges in Emerging Networks

Artificial Intelligence and Security Challenges in Emerging Networks

"This book explores the recent rise of emerging networking technologies such as social networks, content centric networks, IoT networks, etc.

Author: Ryma Abassi

Publisher:

ISBN: 1523123133

Category: COMPUTERS

Page:

View: 229

"This book explores the recent rise of emerging networking technologies such as social networks, content centric networks, IoT networks, etc. It also examines the applications of artificial intelligence (AI), machine learning, and data mining to security and privacy problems"--
Categories: COMPUTERS

Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018.

Author: Raheem Beyah

Publisher: Springer

ISBN: 9783030017040

Category: Computers

Page: 525

View: 447

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.
Categories: Computers

Next Generation of Internet of Things

Next Generation of Internet of Things

This book includes selected papers from the International Conference on Next Generation of Internet of Things (ICNGIoT 2021), organized by the Department of Computer Science and Engineering, School of Engineering, GIET University, Gunupur, ...

Author: Raghvendra Kumar

Publisher: Springer

ISBN: 981160665X

Category: Technology & Engineering

Page: 680

View: 981

This book includes selected papers from the International Conference on Next Generation of Internet of Things (ICNGIoT 2021), organized by the Department of Computer Science and Engineering, School of Engineering, GIET University, Gunupur, Odisha, India, during 5–6 February 2021. The book covers topics such as IoT network design and architecture, IoT network virtualization, IoT sensors, privacy and security for IoT, SMART environment, social networks, data science and data analytics, cognitive intelligence and augmented intelligence, and case studies and applications.
Categories: Technology & Engineering

Game Theory for Networks

Game Theory for Networks

This book constitutes the refereed proceedings of the 7th EAI International Conference on Game Theory for Networks, GameNets 2017, held in Knoxville, Tennessee, USA, in May 2017.

Author: Lingjie Duan

Publisher: Springer

ISBN: 9783319675404

Category: Computers

Page: 173

View: 151

This book constitutes the refereed proceedings of the 7th EAI International Conference on Game Theory for Networks, GameNets 2017, held in Knoxville, Tennessee, USA, in May 2017. The 10 conference papers and 5 invited papers presented cover topics such as smart electric grid, Internet of Things (IoT), social networks, networks security, mobile service markets, and epidemic control.
Categories: Computers

Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018.

Author: Raheem Beyah

Publisher: Springer

ISBN: 9783030017019

Category: Computers

Page: 607

View: 749

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.
Categories: Computers

Social Network Forensics Cyber Security and Machine Learning

Social Network Forensics  Cyber Security  and Machine Learning

This book discusses the issues and challenges in Online Social Networks (OSNs).

Author: P. Venkata Krishna

Publisher: Springer

ISBN: 9789811314568

Category: Computers

Page: 116

View: 949

This book discusses the issues and challenges in Online Social Networks (OSNs). It highlights various aspects of OSNs consisting of novel social network strategies and the development of services using different computing models. Moreover, the book investigates how OSNs are impacted by cutting-edge innovations.
Categories: Computers

Recent Advances in Security Privacy and Trust for Internet of Things IoT and Cyber Physical Systems CPS

Recent Advances in Security  Privacy  and Trust for Internet of Things  IoT  and Cyber Physical Systems  CPS

Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, ...

Author: Kuan-Ching Li

Publisher: CRC Press

ISBN: 9781000326178

Category: Computers

Page: 276

View: 380

Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.
Categories: Computers

Data Science New Issues Challenges and Applications

Data Science  New Issues  Challenges and Applications

This book contains 16 chapters by researchers working in various fields of data science.

Author: Gintautas Dzemyda

Publisher: Springer Nature

ISBN: 9783030392505

Category: Computers

Page: 313

View: 966

This book contains 16 chapters by researchers working in various fields of data science. They focus on theory and applications in language technologies, optimization, computational thinking, intelligent decision support systems, decomposition of signals, model-driven development methodologies, interoperability of enterprise applications, anomaly detection in financial markets, 3D virtual reality, monitoring of environmental data, convolutional neural networks, knowledge storage, data stream classification, and security in social networking. The respective papers highlight a wealth of issues in, and applications of, data science. Modern technologies allow us to store and transfer large amounts of data quickly. They can be very diverse - images, numbers, streaming, related to human behavior and physiological parameters, etc. Whether the data is just raw numbers, crude images, or will help solve current problems and predict future developments, depends on whether we can effectively process and analyze it. Data science is evolving rapidly. However, it is still a very young field. In particular, data science is concerned with visualizations, statistics, pattern recognition, neurocomputing, image analysis, machine learning, artificial intelligence, databases and data processing, data mining, big data analytics, and knowledge discovery in databases. It also has many interfaces with optimization, block chaining, cyber-social and cyber-physical systems, Internet of Things (IoT), social computing, high-performance computing, in-memory key-value stores, cloud computing, social computing, data feeds, overlay networks, cognitive computing, crowdsource analysis, log analysis, container-based virtualization, and lifetime value modeling. Again, all of these areas are highly interrelated. In addition, data science is now expanding to new fields of application: chemical engineering, biotechnology, building energy management, materials microscopy, geographic research, learning analytics, radiology, metal design, ecosystem homeostasis investigation, and many others.
Categories: Computers

Recent Advances in Security Privacy and Trust for Internet of Things IoT and Cyber Physical Systems CPS

Recent Advances in Security  Privacy  and Trust for Internet of Things  IoT  and Cyber Physical Systems  CPS

Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, ...

Author: Kuan-Ching Li

Publisher: CRC Press

ISBN: 9781000326130

Category: Mathematics

Page: 276

View: 911

Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.
Categories: Mathematics

Big Data Analytics in Cybersecurity

Big Data Analytics in Cybersecurity

Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.

Author: Onur Savas

Publisher: CRC Press

ISBN: 9781498772167

Category: Business & Economics

Page: 336

View: 369

Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators. Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes. Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include: Network forensics Threat analysis Vulnerability assessment Visualization Cyber training. In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined. The book first focuses on how big data analytics can be used in different aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.
Categories: Business & Economics

Security and Internet of Things IoT Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities perception towards IoT Privacy and Value

Security and Internet of Things  IoT   Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities  perception towards IoT Privacy and Value

Which means going forward the influence of IoT on our daily lives is only likely to
grow. With the recent advances in sensing technologies, social networking and
mobile and cloud technologies, the boundaries between the physical, social, and
 ...

Author: Mashood Hassan

Publisher: GRIN Verlag

ISBN: 9783668638754

Category: Computers

Page: 139

View: 470

Master's Thesis from the year 2017 in the subject Computer Science - IT-Security, University of Applied Sciences Graz, language: English, abstract: The vision of internet of things (IoT) has become a reality and in recent years, it has seen rapid growth. However, there is a lot more to come from this technological Tsunami. In simple terms, Internet of Things is a network of interconnected objects or things with sensors, collecting data and making actionable decisions. With the arrival and adaptation of this technology, many questions regarding cyber security are raised. This master thesis examines the consumer perspective on key elements of the internet of things. The elements in focus are consumer awareness, the perception of privacy and perception of value. The relationship of these elements with Gender and Nationality is investigated. The study is based on the survey of respondents belonging to Austria and India. After interviewing two experts from the field of the internet of things and reviewing the literature, the vulnerabilities surrounding IoT were confirmed. Lack of consumer awareness is considered a hindrance in the adaptation of IoT, whereas the trust between technology and consumers has decreased over time. It is claimed that consumers do not value security enough to pay extra for it. However, the findings from this study suggest a shift in the understanding and attitude of the consumer base. The author finds while certain trends from previous researchers remain unchanged. There has been an increased awareness among consumers overall. Gender influences the awareness; value perception of consumers is also influenced by Gender and Nationality. The perception of privacy is negative and the trust of consumers remains low. Most people would like to see more work done by the industry and the government to increase consumer education regarding cybersecurity and Internet of Things.
Categories: Computers

Proceeding of the International Conference on Computer Networks Big Data and IoT ICCBI 2019

Proceeding of the International Conference on Computer Networks  Big Data and IoT  ICCBI   2019

This book presents the proceedings of the International Conference on Computing Networks, Big Data and IoT [ICCBI 2019], held on December 19–20, 2019 at the Vaigai College of Engineering, Madurai, India.

Author: A. Pasumpon Pandian

Publisher: Springer Nature

ISBN: 9783030431921

Category: Computers

Page: 1001

View: 310

This book presents the proceedings of the International Conference on Computing Networks, Big Data and IoT [ICCBI 2019], held on December 19–20, 2019 at the Vaigai College of Engineering, Madurai, India. Recent years have witnessed the intertwining development of the Internet of Things and big data, which are increasingly deployed in computer network architecture. As society becomes smarter, it is critical to replace the traditional technologies with modern ICT architectures. In this context, the Internet of Things connects smart objects through the Internet and as a result generates big data. This has led to new computing facilities being developed to derive intelligent decisions in the big data environment. The book covers a variety of topics, including information management, mobile computing and applications, emerging IoT applications, distributed communication networks, cloud computing, and healthcare big data. It also discusses security and privacy issues, network intrusion detection, cryptography, 5G/6G networks, social network analysis, artificial intelligence, human–machine interaction, smart home and smart city applications.
Categories: Computers

Recent Trends and Advances in Wireless and IoT enabled Networks

Recent Trends and Advances in Wireless and IoT enabled Networks

The book covers a variety of topics in Information and Communications Technology (ICT) and their impact on innovation and business.

Author: Mian Ahmad Jan

Publisher: Springer

ISBN: 9783319999661

Category: Technology & Engineering

Page: 352

View: 690

The book covers a variety of topics in Information and Communications Technology (ICT) and their impact on innovation and business. The authors discuss various innovations, business and industrial motivations, and impact on humans and the interplay between those factors in terms of finance, demand, and competition. Topics discussed include the convergence of Machine to Machine (M2M), Internet of Things (IoT), Social, and Big Data. They also discuss AI and its integration into technologies from machine learning, predictive analytics, security software, to intelligent agents, and many more. Contributions come from academics and professionals around the world. Covers the most recent practices in ICT related topics pertaining to technological growth, innovation, and business; Presents a survey on the most recent technological areas revolutionizing how humans communicate and interact; Features four sections: IoT, Wireless Ad Hoc & Sensor Networks, Fog Computing, and Big Data Analytics.
Categories: Technology & Engineering