Secure Edge Computing: Applications, Techniques and Challenges 1st Edition Mohiuddin Ahmed – Ebook Instant Download/Delivery ISBN(s): 9780367464141,0367464144
Product details:
• ISBN 10:0367464144
• ISBN 13:9780367464141
• Author:
The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy.
Table contents:
Chapter 1: Secure Fog-Cloud of Things: Architectures, Opportunities and Challenges
Chapter 2: Collaborative and Integrated Edge Security Architecture
Chapter 3: A Systemic IoT–Fog–Cloud Architecture for Big-Data Analytics and Cyber Security Systems
Chapter 4: Security and Organizational Strategy: A Cloud and Edge Computing Perspective
Chapter 5: An Overview of Cognitive Internet of Things: Cloud and Fog Computing
Chapter 6: Privacy of Edge Computing and IoT
Chapter 7: Reducing the Attack Surface of Edge Computing IoT Networks via Hybrid Routing Using
Chapter 8: Early Identification of Mental Health Disorder Employing Machine Learning-based Secure
Chapter 9: Harnessing Artificial Intelligence for Secure ECG Analytics at the Edge for Cardiac Arrhythmia
Chapter 10: On Securing Electronic Healthcare Records Using Hyperledger Fabric Across the Network Edge
Chapter 11: AI-Aided Secured ECG Live Edge Monitoring System with a Practical Use-Case
Chapter 12: Application of Unmanned Aerial Vehicles in Wireless Networks: Mobile Edge Computing and Caching
Chapter 13: Vehicular Edge Computing Security
Chapter 14: On Exploiting Blockchain Technology to Approach toward Secured, Sliced, and Edge
Chapter 15: Usage of Blockchain for Edge Computing
People also search:
energy-efficient computation offloading for secure uav-edge-computing systems
secure and trustworthy edge computing systems
edge computing security issues
was ist edge computing
what is edge computing in cyber security