Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. Provides several characteristics of social, network, and physical security associated with social information networks Presents the security mechanisms and events related to social information networks Covers emerging topics, such as network information structures like on-line social networks, heterogeneous and homogeneous information networks, and modern information networks Includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models
Audience This book is directed to IT engineers, programmers, security professionals, and a wide array of interested hackers and device makers requiring an understanding of the vulnerabilities associated with the Internet of Things and cloud ...
... in: Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, Academic Press, 2018, pp. 77–101. [20] S. Deshmukh-Bhosale, S.S. Sonavane, A real-time intrusion detection system for wormhole attack in the ...
This book will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.
In: Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, pp. 77–101. Academic Press (2018) 12. O'Conner, L.: 2016 IEEE tenth international conference on semantic computing, ICSC 2016.
This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites.
The aim of this book is to stimulate research on the topic of the Social Internet of Things, and explore how Internet of Things architectures, tools, and services can be conceptualized and developed so as to reveal, amplify and inspire the ...
This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in ...
This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics.
... technical design of an IoT system where the privacy focuses on the norms that can encourage lucidity and can preserve the social dignity of a person [24]. In the design approach itself the user is provided with predefined security.
This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications.