| 紀錄類型: |
書目-電子資源
: Monograph/item
|
| 正題名/作者: |
Secure edge and fog computing enabled AI for IoT and smart cities/ edited by Ahmed A. Abd El-Latif ... [et al.]. |
| 其他題名: |
includes selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / |
| 其他題名: |
ICACNGC 2022 |
| 其他作者: |
Abd El-Latif, Ahmed A. |
| 出版者: |
Cham :Springer International Publishing : : 2024., |
| 面頁冊數: |
xvii, 256 p. :ill., digital ;24 cm. |
| 內容註: |
Part 1: AI Enabled Smart City IoT System using Edge /Fog Computing -- Chapter 1. Multi-level edge computing system for autonomous vehicles -- Chapter 2. UAVs based edge computing system for smart city applications -- Chapter 3. Organization of Smart City Services Based on Microservice Architecture -- Chapter 4. Pseudo-Random Error-Correcting Codes in Network Coding -- Chapter 5. Proactive management in Smart City: transport convoys -- Chapter 6. Federated Learning for Linux Malware Detection: An Experimental Study -- Chapter 7. Delay prediction in M2M networks using Deep Learning approach -- Chapter 8. Energy-Efficient Beam Shaping in MIMO System Using Machine Learning -- Chapter 9. Channel Cluster Configuration Selection Method for IEEE 802.11 Networks Planning -- Chapter 10. Service migration algorithm for UAVs recharge zones in future 6G network -- Chapter 11. FedBA: Non-IID Federated Learning Framework in UAV Networks -- Part 2: Fog/Edge Computing Security Issues -- Chapter 12. Big Data Analytics for Secure Edge-based Manufacturing Internet of Things (MIoT) -- Chapter 13. Artificial Intelligence-Based Secure Edge Computing Systems for IoTDs and Smart Cities: A Survey -- Chapter 14. Machine Learning Techniques for Secure Edge SDN -- Chapter 15. Machine Learning-Based Identity and Access Management for Cloud Security -- Chapter 16. Spatial Data of Smart Cities: Trust -- Chapter 17. Smart City Infrastructure Projects: Spatial Data of Risks -- Chapter 18. A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks -- Chapter 19. Development of determining a wireless client location method in the IEEE 802.11 network in order to ensure the IT infrastructure security. |
| Contained By: |
Springer Nature eBook |
| 標題: |
Edge computing - Congresses. - Security measures - |
| 電子資源: |
https://doi.org/10.1007/978-3-031-51097-7 |
| ISBN: |
9783031510977 |