Security, Data Analytics, and Energy-Aware Solutions in the IoT
5% Pre Publication Discount available until one month after release.

Security, Data Analytics, and Energy-Aware Solutions in the IoT

Xiali Hei (University of Louisiana at Lafayette, USA)
Projected Release Date: December, 2021|Copyright: © 2022 |Pages: 300
DOI: 10.4018/978-1-7998-7323-5
ISBN13: 9781799873235|ISBN10: 1799873234|EISBN13: 9781799873259|ISBN13 Softcover: 9781799873242
Hardcover:
Forthcoming
$213.75
List Price: $225.00
5% Discount:-$11.25
TOTAL SAVINGS: $11.25
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Forthcoming
$192.38
List Price: $225.00
10% Discount:-$22.50
5% Discount:-$10.13
TOTAL SAVINGS: $32.63
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Forthcoming
$256.50
List Price: $270.00
5% Discount:-$13.50
TOTAL SAVINGS: $13.50
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Softcover:
Forthcoming
$161.50
List Price: $170.00
5% Discount:-$8.50
TOTAL SAVINGS: $8.50
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Description & Coverage
Description:

Internet of things networks have shown promising outcomes in the provisioning of potentially critical services such as safety applications, healthcare, and manufacturing. However, there are many challenges related to the security, data analysis, and limited resources of the performed operations that require further investigation. Additional research is necessary to address the concerns and doubts of researchers and industry professionals in the Internet of Things.

Security, Data Analytics, and Energy-Aware Solutions in the IoT reports novel methodologies, theories, technologies, and solutions for security and data analytics techniques and energy-aware solutions for the Internet of Things. Covering a wide range of topics such as laser attacks and personal data, it is ideal for academicians, industry professionals, researchers, instructors, and students.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Artificial Intelligence
  • Audio Injection Attacks
  • Biometric Sensors
  • Brain-Computer Interface-Attack
  • Data Analytics
  • Data Networking
  • Laser Attacks
  • Personal Data
  • Surgical Robot Security
  • Voice-Controllable Devices
Table of Contents
Search this Book:
Reset
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.