Add free shipping to your order with these great books
Quality Assessment and Security in Industrial Internet of Things - Sudan Jha

eTEXT

Quality Assessment and Security in Industrial Internet of Things

By: Sudan Jha (Editor), Sarbagya Ratna Shakya (Editor), Sultan Ahmad (Editor), Zhaoxian Zhou (Editor)

eText | 30 October 2024 | Edition Number 1

At a Glance

eText


$177.10

or 4 interest-free payments of $44.27 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Read online on
Desktop
Tablet
Mobile

Not downloadable to your eReader or an app

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This book highlights authentication and trust evaluation models in the Industrial Internet of Things. It further discusses data breaches and security issues in various Artificial Intelligence-enabled systems and uses Blockchain to resolve the challenges faced by the Industrial Internet of Things. The text showcases performance quality assessment for the Industrial Internet of Things' applications.

This book:

  • Discusses and evaluates different quality assessment systems and authentication of smart devices
  • Addresses data handling, data security, confidentiality, and integrity of data in the Industrial Internet of Things
  • Focuses on developing framework and standardization of quality assessment for diverse Internet of Things-enabled devices
  • Explains the designing, developing, and framing of smart machines, that are equipped with tools for tracking and logging data to provide advanced security features
  • Presents the convergence of the Internet of Things toward Industry 4.0 through quality assessment via analyzing data security and identifying vulnerabilities

It is primarily written for graduate students and academic researchers in the fields of electrical engineering, electronics, and communications engineering, industrial and production engineering, computer science, and engineering.

Read online on
Desktop
Tablet
Mobile

More in Systems Analysis & Design

Quantum Computing - Alex Wood

eBOOK