Читать книгу Security Issues and Privacy Concerns in Industry 4.0 Applications - Группа авторов - Страница 5
List of Tables
Оглавление1 Chapter 1Table 1.1 Research on IoT-based SWMS.
2 Chapter 2Table 2.1 Network forensics architecture conceptual block of the model.
3 Chapter 3Table 3.1 List of open source datasets for Tamil language.Table 3.2 Performance of ASR systems using various extraction and classification...
4 Chapter 4Table 4.1 Data analysis on correlation.Table 4.2 Serial test.Table 4.3 Avalanche effect: change in session key.Table 4.4 Comparison between proposed algorithm and standard algorithms.Table 4.5 Comparison between some existing algorithm and proposed algorithm.Table 4.6 Different IoT attacks.
5 Chapter 5Table 5.1 Initial features from profiles.Table 5.2 Confusion matrix for fake profile detection testing data set.Table 5.3 Performance analysis of Random Forest, Optimized Naive Bayes and SVM.Table 5.4 Evaluation metrics (Precision, Recall and F-Score) of Random Forest, O...
6 Chapter 6Table 6.1 Hardware and software components.
7 Chapter 8Table 8.1 Shows the blockchain pros and cons [12].Table 8.2 A comparison between private, public and consortium blockchain.Table 8.3 Factors affecting the implementation of blockchain technology.Table 8.4 Sector-wide uses and application areas of blockchain technology.
8 Chapter 11Table 11.1 Sample data from simulations using first-come first-serve method.Table 11.2 Sample data from simulations using the Proposed Algorithm.