Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 13227 dokumen yang sesuai dengan query
cover
Lele, Ajey
"This book debates and discusses the present and future of Disruptive Technologies in general and military Disruptive Technologies in particular. Its primary goal is to discuss various critical and advanced elucidations on strategic technologies. The focus is less on extrapolating the future of technology in a strict sense, and more on understanding the Disruptive Technology paradigm.
It is widely accepted that technology alone cannot win any military campaign or war. However, technological superiority always offers militaries an advantage. More importantly, technology also has a great deterrent value. Hence, on occasion, technology can help to avoid wars. Accordingly, it is important to effectively manage new technologies by identifying their strategic utility and role in existing military architectures and the possible contributions they could make towards improving overall military capabilities. This can also entail doctrinal changes, so as to translate these new technologies into concrete advantages."
Singapore: Springer Nature, 2019
e20507839
eBooks  Universitas Indonesia Library
cover
Cham: Springer, 2018
006.3 TRE
Buku Teks  Universitas Indonesia Library
cover
"This book provides an insight into IoT intelligence in terms of applications and algorithmic challenges. The book is dedicated to addressing the major challenges in realizing the artificial intelligence in IoT-based applications including challenges that vary from cost and energy efficiency to availability to service quality in multidisciplinary fashion. The aim of this book is hence to focus on both the algorithmic and practical parts of the artificial intelligence approaches in IoT applications that are enabled and supported by wireless sensor networks and cellular networks. Targeted readers are from varying disciplines who are interested in implementing the smart planet/environments vision via intelligent wireless/wired enabling technologies."
Switzerland: Springer Nature, 2019
e20472543
eBooks  Universitas Indonesia Library
cover
"This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future."
Switzerland: Springer Cham, 2019
e20502801
eBooks  Universitas Indonesia Library
cover
Muhammad Fadhlan Harits
"Perangkat Internet of Things (IoT) telah mengalami peningkatan signifikan dalam beberapa tahun terakhir, pada tahun 2020 diketahui bahwa terdapat sekitar 11.3 miliar perangkat IoT yang terhubung di seluruh dunia dan akan terus berkembang setiap tahun. Salah satu tantangan yang dapat timbul pada penggunaan perangkat IoT adalah pada aspek keamanan dimana terdapat beberapa pendekatan untuk melakukan peningkatan keamanan, salah satunya adalah pada sisi kode sumber yang digunakan untuk menjalankan perangkat IoT. Penelitian ini akan melakukan analisis terhadap efektivitas peningkatan keamanan melalui metode shifting left security yaitu kode sumber atau hasil kompilasi kode sumber akan dianalisis sebelum dirilis pada perangkat IoT serta pengujian perangkat IoT dalam lingkungan internal sebelum dirilis ke publik. Pada penelitian ini telah dilakukan percobaan terhadap serangan SQL Injection, Broken Authentication, dan Denial of Service serta diketahui bahwa terdapat peningkatan sebesar 66% pada implementasi metode shifting left security dalam pengembangan perangkat IoT yaitu terdapat serangan SQL Injection dan Broken Authentication yang dapat dicegah serta serangan Denial of Service yang masih ditemukan setelah metode shifting left security diterapkan.

Internet of Things (IoT) devices have had significant increase during the last few years, in 2020 it is known that there were approximately 11.3 billion connected devices around the world and is continuing to develop throughout each year. One of the challenges that may occur when implementing IoT devices is security in which there are several approaches that can be taken for increasing security, one of the approaches is through analyzing the source code that is used for running the device. This research will conduct an analysis upon the effectiveness of shifting left security where the source code or the binary will be analyzed before it is deployed onto the IoT device as well as testing the IoT device in an internal environment prior to public release. Based on the tests conducted in this research through several attacks such as SQL Injection, Broken Authentication, and Denial of Service it is known that the security of IoT devices can be improved by 66% when implementing the shifting left security method in which SQL Injection and Broken Authentication are two of the attacks that can be mitigated while Denial of Service attack still persists after the shifting left security method had been implemented.
"
Depok: Fakultas Teknik Universitas Indonesia, 2022
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
"The book covers a variety of topics in Information and Communications Technology (ICT) and their impact on innovation and business. The authors discuss various innovations, business and industrial motivations, and impact on humans and the interplay between those factors in terms of finance, demand, and competition. Topics discussed include the convergence of Machine to Machine (M2M), Internet of Things (IoT), Social, and Big Data. They also discuss AI and its integration into technologies from machine learning, predictive analytics, security software, to intelligent agents, and many more. Contributions come from academics and professionals around the world.
- Covers the most recent practices in ICT related topics pertaining to technological growth, innovation, and business;
- Presents a survey on the most recent technological areas revolutionizing how humans communicate and interact;
- Features four sections: IoT, Wireless Ad Hoc & Sensor Networks, Fog Computing, and Big Data Analytics."
Switzerland: Springer Nature, 2019
e20509894
eBooks  Universitas Indonesia Library
cover
Gaillardon, Pierre-Emmanuel
"This book discusses the opportunities offered by disruptive technologies to overcome the economical and physical limits currently faced by the electronics industry. It provides a new methodology for the fast evaluation of an emerging technology from an architectural prospective and discusses the implications from simple circuits to complex architectures. Several technologies are discussed, ranging from 3-D integration of devices (phase change memories, monolithic 3-D, vertical nanowires-based transistors) to dense 2-D arrangements (double-gate carbon nanotubes, sublithographic nanowires, lithographic crossbar arrangements). Novel architectural organizations, as well as the associated tools, are presented in order to explore this freshly opened design space.
"
New York: [, Springer], 2012
e20418197
eBooks  Universitas Indonesia Library
cover
"This book provides insight and expert advice on the challenges of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for the growing Internet of Things (IoT) in our connected world. Contributors cover physical, legal, financial and reputational risk in connected products and services for citizens and institutions including industry, academia, scientific research, healthcare and smart cities. As an important part of the Women in Science and Engineering book series, the work highlights the contribution of women leaders in TIPPSS for IoT, inspiring women and men, girls and boys to enter and apply themselves to secure our future in an increasingly connected world. The book features contributions from prominent female engineers, scientists, business and technology leaders, policy and legal experts in IoT from academia, industry and government."
Switzerland: Springer Nature Switzerland, 2019
e20509438
eBooks  Universitas Indonesia Library
cover
Girasa, Rosario
"Artificial intelligence (AI) is the latest technological evolution which is transforming the global economy and is a major part of the “Fourth Industrial Revolution.”
This book covers the meaning, types, subfields and applications of AI, including U.S. governmental policies and regulations, ethical and privacy issues, particularly as they pertain and affect facial recognition programs and the Internet-of Things (IoT). There is a lengthy analysis of bias, AI’s effect on the current and future job market, and how AI precipitated fake news. In addition, the text covers basics of intellectual property rights and how AI will transform their protection. The author then moves on to explore international initiatives from the European Union, China’s New Generation Development Plan, other regional areas, and international conventions. The book concludes with a discussion of super intelligence and the question and applicability of consciousness in machines. The interdisciplinary scope of the text will appeal to any scholars, students and general readers interested in the effects of AI on our society, particularly in the fields of STS, economics, law and politics."
Switzerland: Palgrave Macmillan Cham, 2020
e20550615
eBooks  Universitas Indonesia Library
cover
"This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.
Shares results from several international research projects on IoT, cybersecurity, and privacy;
Combines complementary expertise from top experts in IoT, security, and data protection;
Provides a comprehensive view on how to protect IoT deployments and make them comply with the GDPR."
Switzerland: Springer Nature, 2019
e20509083
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>