Читать книгу Intelligent Security Management and Control in the IoT - Mohamed-Aymen Chalouf - Страница 3

List of Tables

Оглавление

1 Chapter 1Table 1.1. Some vehicular network services and the corresponding QoS parametersTable 1.2. Weight estimation for services considered in vehicular networksTable 1.3. Simulation parameters for scenario 1Table 1.4. Simulation parameters for scenario 2Table 1.5. Simulation parameters for the SUMO vehicle

2 Chapter 2Table 2.1. Physical channel and signals from the NB-IoT

3 Chapter 3Table 3.1. Summary of articles presented

4 Chapter 4Table 4.1. Parameters for simulation scenariosTable 4.2. Characteristics of simulation scenarios 1 and 2Table 4.3. Characteristics of simulation scenarios 3 and 4

5 Chapter 5Table 5.1. Model Open Systems Interconnection (OSI) in “classic” Internet protoc...

6 Chapter 6Table 6.1. Characteristics of different sources of energy (from Vullers et al. 2...Table 6.2. Set of rules used by the inference motorTable 6.3. Simulation parameter values. Details of parameters of P-FREEN, Fuzzym...

7 Chapter 7Table 7.1. IoT-MAAC attributesTable 7.2. Principle of the inference base of the TSK model for evaluating the t...

8 Chapter 8Table 8.1. Comparison of biometric characteristics according to the following pr...Table 8.2. Description of authentication factorsTable 8.3. Notation table

9 Chapter 11Table 11.1. Tokens in the MTD domainTable 11.2. Physical layer components (OSI L1) and variants for the IoTTable 11.3. Components of the link layer (OSI L2) and its variants for the IoTTable 11.4. Components of the network layer (OSI L3) and its variants for the Io...Table 11.5. Components of the transport layer (OSI L4) and its variants for the ...Table 11.6. Application (OSI L5-7) layer components and variants for the IoT

Intelligent Security Management and Control in the IoT

Подняться наверх