Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/secure-edge-and-fog-computing-enabled-ai-for-iot-and-smart-cities/descriptif_5081269
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=5081269

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities , 1st ed. 2024 Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) EAI/Springer Innovations in Communication and Computing Series

Langue : Anglais

Coordonnateurs : Abd El-Latif Ahmed A., Tawalbeh Lo’ai, Maleh Yassine, Gupta Brij B.

Couverture de l’ouvrage Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities

This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022).

Part 1 AI Enabled Smart City IoT System using Edge /Fog Computing Chapter 1 Multi-level edge computing system for autonomous vehicles Chapter 2 UAVs based edge computing system for smart city applications Chapter 3 Organization of Smart City Services Based on Microservice Architecture Chapter 4 Pseudo-Random Error-Correcting Codes in Network Coding Chapter 5 Proactive management in Smart City: transport convoys Chapter 6 Federated Learning for Linux Malware Detection: An Experimental Study Chapter 7 Delay prediction in M2M networks using Deep Learning approach Chapter 8 Energy-Efficient Beam Shaping in MIMO System Using Machine Learning Chapter 9 Channel Cluster Configuration Selection Method for IEEE 802.11 Networks Planning Chapter 10 Service migration algorithm for UAVs recharge zones in future 6G network Chapter 11 FedBA: Non-IID Federated Learning Framework in UAV Networks Part 2 Fog/Edge Computing Security Issues Chapter 12 Big Data Analytics for Secure Edge-based Manufacturing Internet of Things (MIoT) Chapter 13 Artificial Intelligence-Based Secure Edge Computing Systems for IoTDs and Smart Cities: A Survey Chapter 14 Machine Learning Techniques for Secure Edge SDN Chapter 15  Machine Learning-Based Identity and Access Management for Cloud Security Chapter 16 Spatial Data of Smart Cities: Trust Chapter 17 Smart City Infrastructure Projects: Spatial Data of Risks Chapter 18 A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks Chapter 19 Development of determining a wireless client location method in the IEEE 802.11 network in order to ensure the IT infrastructure security

Ahmed A. Abd El-Latif (SMIEEE, MACM) received the B.Sc. degree with honour rank in Mathematics and Computer Science in 2005 and M.Sc. degree in Computer Science in 2010, all from Menoufia University, Egypt. He received his Ph. D. degree in Computer Science & Technology at Harbin Institute of Technology (H.I.T), Harbin, P. R. China in 2013. He is an associate professor of Computer Science at Menoufia University, Egypt, and at EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Saudi Arabia. In more than 17 years of his professional experience, he published over 260 papers in journals/conferences including 10 books with over 8800 citations. He was also selected in the 2022, 2021 and 2020 Stanford University's ranking of the world's top 2% scientists. He involved in government and international funded R&D projects related to the widespread use of artificial intelligence for 5G/6G networks. He received many awards, State Encouragement Award in Engineering Sciences 2016, Arab Republic of Egypt; the best Ph.D. student award from Harbin Institute of Technology, China 2013; Young scientific award, Menoufia University, Egypt 2014. He is a fellow at Academy of Scientific Research and Technology, Egypt. His areas of interests are Cybersecurity, 5G/6G Wireless Networks, Post-Quantum Cryptography, Artificial Intelligence of Things, AI-Based Image Processing, Information Hiding, Dynamical systems (Discrete-time models: Chaotic systems and Quantum Walks). He is the leader of mega grant program "Research of network technologies with ultra-low latency and ultra-high density based on the widespread use of artificial intelligence for 6G networks". Dr. Abd El-Latif is the chair/co-chair of many Scopus/ EI conferences. He is the EIC of International Journal of Information Security and Privacy, and series editor of Advances in Cybersecurity Management. Also, academic editor/ associate editor for set of indexed

Discusses, evaluates, and improves approaches in data protections in IoT and edge/ fog computing

Lays a foundation of the core concepts and principles of IoT and 5G security for edge/ fog computing

Includes selected papers from ICACNGC 2022

Date de parution :

Ouvrage de 256 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

158,24 €

Ajouter au panier