TY - BOOK ID - 37827950 TI - Ubiquitous Computing and Computing Security of IoT AU - Jeyanthi, N. AU - Abraham, Ajith AU - Mcheick, Hamid. PY - 2019 SN - 3030015661 3030015653 PB - Cham : Springer International Publishing : Imprint: Springer, DB - UniCat KW - Internet of things KW - Ubiquitous computing. KW - Security measures. KW - Engineering. KW - Data protection. KW - Big data. KW - Artificial intelligence. KW - Computational Intelligence. KW - Security. KW - Big Data. KW - Artificial Intelligence. KW - AI (Artificial intelligence) KW - Artificial thinking KW - Electronic brains KW - Intellectronics KW - Intelligence, Artificial KW - Intelligent machines KW - Machine intelligence KW - Thinking, Artificial KW - Bionics KW - Cognitive science KW - Digital computer simulation KW - Electronic data processing KW - Logic machines KW - Machine theory KW - Self-organizing systems KW - Simulation methods KW - Fifth generation computers KW - Neural computers KW - Data sets, Large KW - Large data sets KW - Data sets KW - Data governance KW - Data regulation KW - Personal data protection KW - Protection, Data KW - Construction KW - Industrial arts KW - Technology KW - Pervasive computing KW - UbiComp (Computer science) KW - Embedded computer systems KW - IoT (Computer networks) KW - Things, Internet of KW - Computer networks KW - Embedded Internet devices KW - Machine-to-machine communications KW - Distributed processing KW - Computational intelligence. KW - Intelligence, Computational KW - Artificial intelligence KW - Soft computing UR - https://www.unicat.be/uniCat?func=search&query=sysid:37827950 AB - This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future. ER -