Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    (DE-602)edoccha_9961350492902883
    Format: 1 online resource (223 pages)
    Edition: 1st ed.
    ISBN: 981-9957-32-X
    Note: Intro -- Preface -- Acknowledgment -- Contents -- About the Authors -- Chapter 1: Introduction -- 1.1 Industrial Internet-Centric Intelligent Resources Scheduling -- 1.1.1 Related Work -- 1.1.2 Edge-Enabled IoT Service Orchestration Framework -- 1.1.3 Problem Formulation for Optimal Resource Allocation -- 1.2 Industrial Internet-Centric Privacy and Security -- 1.2.1 Security-Enforcement Technique -- 1.2.1.1 Securing Edge-Enabled from Attacks -- 1.2.1.2 Vulnerabilities of Edge-Enabled IoT -- 1.2.1.3 Edge-Enabled IoT Traffic Scenario -- 1.2.1.4 System Modeling and Analysis -- Link Selection Module -- Attack Detection Module -- Malicious Flow Interception Module -- 1.2.2 Privacy-Preserving Technique -- 1.2.2.1 Related Work and Motivation Analysis -- 1.2.2.2 System Modeling and Analysis -- Components -- Architecture -- Authentication Mechanism -- 1.2.2.3 Working Principle of the Proposed Technique -- 1.3 Introduction to Business Process Management -- 1.3.1 Business Process Management (BPM) -- 1.3.2 The Benefits and Drivers -- 1.3.3 The Process Lifecycle and Methodologies -- 1.3.4 Challenges and Best Practices in BPM -- 1.4 Summary -- References -- Chapter 2: Architecture of Industrial Internet-Centric BPM -- 2.1 Mobile Industrial Internet-Centric BPM -- 2.1.1 Introduction -- 2.1.2 Server Selection Example -- 2.1.2.1 Formulation of Server Selection Problem -- 2.1.2.2 Architecture -- 2.2 Resources Deployment in BPM -- 2.2.1 Introduction -- 2.2.2 Architecture -- 2.3 Business Process Scheduling Problem -- 2.3.1 Introduction -- 2.3.2 Architecture for Business Process Scheduling Problem -- 2.4 Summary -- References -- Chapter 3: Industrial-Metadata Intelligent Service for Geo-Distributed File System -- 3.1 Metadata Service in Geo-Distributed File System -- 3.2 Industrial Distributed Virtual Edge Data Center. , 3.3 Intelligent Metadata Service for Industrial Edge Data Center -- 3.4 Analysis of Industrial-Metadata Intelligent Service -- 3.5 Summary -- References -- Chapter 4: Intelligent Cooperation Technology for Multi-Access Device -- 4.1 D2D Cooperation in Multi-Access Transmission Network -- 4.2 Device Selection During Cooperative D2D Transmission -- 4.3 Dynamic Intelligent Decision in Multi-Path Parallel Transmission -- 4.4 Intelligent Multi-Access Device Cooperation in Multi-Path Network -- 4.5 Summary -- References -- Chapter 5: Deep Optimization for Storage and Computation Over Industrial Internet -- 5.1 Deep Learning-Empowered Industrial Internet -- 5.2 Attentive Model Compression for Deep Learning Model -- 5.3 Computation Sharing Across Multi-Application -- 5.4 Deep Optimization for Industrial Applications -- 5.5 Summary -- References -- Chapter 6: User Data Privacy Protection in Industrial Application -- 6.1 Location Data Privacy of User Over Industrial Internet -- 6.2 Adversary Against Location Data Privacy of User -- 6.2.1 Adversary Type -- 6.2.2 Adversary Behavior -- 6.3 CPP: A Content-Aware Privacy Protection Method -- 6.4 Analysis of CPP Applied to Industrial Application -- 6.4.1 Experiment Setup -- 6.4.1.1 Experimental Data -- 6.4.1.2 Experimental Metrics -- Uncertainty λ -- The Proportion of Recognized Dummy LBS RecDummy -- The Proportion of Restored Trajectory ResTra -- Comparison Methods -- Experimental Parameters -- 6.4.2 Comparison Results -- 6.5 Summary -- References -- Chapter 7: Industrial Application Data Security Preservation in Edge Computing -- 7.1 Data Security Preservation by Authentication -- 7.2 Edge User Authentication Problem in Industrial Application -- 7.3 EdgeAuth: An Intelligent Token-Based Collaborative Authentication Scheme -- 7.3.1 System Model -- 7.3.2 General Authentication Process -- 7.3.3 Adversary Model. , 7.3.4 Token Structure -- 7.3.5 Registration -- 7.3.6 Cloud-Side Authentication -- 7.3.7 Edge-Side Authentication -- 7.3.8 Nonce Synchronization -- 7.4 Performance and Security Analysis of EdgeAuth -- 7.4.1 Research Questions -- 7.4.2 Experiment Setup -- 7.4.3 Baseline Schemes -- 7.4.4 Performance Metrics -- 7.4.5 Experimental Results -- 7.4.6 Discussion -- 7.4.7 Security Analysis -- 7.4.7.1 Defense Against Replay Attack -- 7.4.7.2 Defense Against DoS Attack -- 7.4.7.3 Defense Against Man-in-the-Middle Attack -- 7.5 Summary -- References -- Chapter 8: Attribute-Based Intelligent Data Management for Industrial Application -- 8.1 Product Data Management in Industrial Application -- 8.2 Blockchain-Driven Data Management Example -- 8.3 Attribute-Based Intelligent Data Management Over Industrial Metaverse -- 8.4 A Blockchain-Driven Method for Product Data´s Version Management in Industrial Metaverse -- 8.4.1 Preliminaries of Version Management in Industrial Metaverse -- 8.4.2 Smart Contract of Blockchain for Version Management -- 8.4.3 The Blockchain-Driven Method for Product Data´s Version Management -- 8.4.3.1 Initialization -- 8.4.3.2 Version Data Encryption -- 8.4.3.3 Token Generation -- 8.4.3.4 Version Data Decryption -- 8.5 Evaluation and Security Analysis -- 8.6 Summary -- References -- Chapter 9: Mobile Business Task Management Over Industrial Internet -- 9.1 Location-Aware Business Task Computing Over Industrial Internet -- 9.2 Edge Server Selection in Mobile Business Task Management -- 9.3 Intelligent Edge Server Selection in Mobile Industrial Internet Environment -- 9.3.1 Step 1: The Location-Aware -- 9.3.2 Step 2: Ssource Sends Pre-Request -- 9.3.3 Step 3: Scandidate Handles Pre-Requests -- 9.3.4 Step 4: Ss Performs the Actual Transfer -- 9.4 Analysis of the Intelligent Edge Server Selection Method -- 9.4.1 Evaluation of Queued Tasks Number. , 9.4.2 Evaluation of Availability -- 9.4.3 Evaluation of System Cost -- 9.4.4 Evaluation of Average Communication Hops -- 9.5 Summary -- References -- Chapter 10: Intelligent Business Resources Deployment Over Industrial Internet -- 10.1 Resource Deployment for Business Process Management -- 10.2 Intelligent Business Resource Deployment Based on Bayesian Optimization -- 10.3 BOA-Based Business Resource Deployment over Industrial Internet -- 10.4 Summary -- References -- Chapter 11: Intelligent Business Process Scheduling for Industrial Application -- 11.1 Edge Computing-Enabled Business Process Scheduling -- 11.2 Cost-Efficient Edge Channel Deployment -- 11.3 Intelligent Process Scheduling for Business Process Management -- 11.4 Edge Channel Deployment-Based Process Scheduling for Industrial Application -- 11.5 Summary -- References.
    Additional Edition: Print version: Dou, Wanchun Intelligent Industrial Internet Systems Singapore : Springer,c2023
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages