Chapter 9Secure IoV-enabled systems at Fog ComputingLayout, security, and optimization algorithms and open issues
Anshu Devi, Ramesh Kait, and Virender Ranga
CONTENTS
9.1 INTRODUCTION
Yesteryear’s businesses and people are heavily dependent on smart technologies and personal computers to reconcile with routine activities. These smart devices produce data by utilizing a wide range of applications and sensor technologies, and their sophistication is increasing all the time. As a result, ...
Get Advances in Cyber Security and Intelligent Analytics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.