SØG - mellem flere end 8 millioner bøger:
Viser: Vehicular Cyber Physical Systems - Adaptive Connectivity and Security
Vehicular Cyber Physical Systems Vital Source e-bog
Danda B. Rawat og Chandra Bajracharya
(2016)
Vehicular Cyber Physical Systems Vital Source e-bog
Danda B. Rawat og Chandra Bajracharya
(2016)
Vehicular Cyber Physical Systems
Adaptive Connectivity and Security
Danda B. Rawat og Chandra Bajracharya
(2016)
Sprog: Engelsk
om ca. 10 hverdage
Detaljer om varen
- Vital Source searchable e-book (Fixed pages)
- Udgiver: Springer Nature (September 2016)
- Forfattere: Danda B. Rawat og Chandra Bajracharya
- ISBN: 9783319444949
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.
Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)
Detaljer om varen
- Vital Source 365 day rentals (fixed pages)
- Udgiver: Springer Nature (September 2016)
- Forfattere: Danda B. Rawat og Chandra Bajracharya
- ISBN: 9783319444949R365
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: 5 år fra købsdato.
Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)
Detaljer om varen
- Hardback: 75 sider
- Udgiver: Springer International Publishing AG (September 2016)
- Forfattere: Danda B. Rawat og Chandra Bajracharya
- ISBN: 9783319444932
Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications.
The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.