Cover of Fadi Al-Turjman (EDT), B.D. Deebak (EDT): Security in IoT Social Networks

Fadi Al-Turjman (EDT), B.D. Deebak (EDT) Security in IoT Social Networks

Price for Eshop: 3454 Kč (€ 138.2)

VAT 0% included

New

E-book delivered electronically online

E-Book information

Elsevier Science

2020

EPub, PDF
How do I buy e-book?

266

978-0-12-821603-3

0-12-821603-4

Annotation

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. Provides several characteristics of social, network, and physical security associated with social information networks Presents the security mechanisms and events related to social information networks Covers emerging topics, such as network information structures like on-line social networks, heterogeneous and homogeneous information networks, and modern information networks Includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models

Ask question

You can ask us about this book and we'll send an answer to your e-mail.