首页> 外文会议>International Conference on Information Technology - New Generations >Access Controls in Internet of Things to Avoid Malicious Activity
【24h】

Access Controls in Internet of Things to Avoid Malicious Activity

机译:在互联网上访问控制以避免恶意活动

获取原文

摘要

18.1 Introduction The IoT consists of physical objects embedded with sensors, software, cloud, and network connectivity of these objects to store, exchange, process, and make decision of complex data. In the smart city, the data generates from activities, events, and other sources of making data (mostly from sensors) for decision-making on a real-time basis. The other sources of data may be traffic signals, smart devices, embedded systems, and traffic. The data generated is in large volume, continuous, and in high velocity. This type of data is called big data in current technology.
机译:18.1简介IOT由嵌入具有传感器,软件,云和网络连接的物理对象,用于存储,交换,处理和制定复杂数据的决策。在智能城市中,数据从活动,事件和其他来源生成数据(主要来自传感器),以实时决策。其他数据来源可以是交通信号,智能设备,嵌入式系统和流量。产生的数据大容积,连续,高速。这种类型的数据被称为当前技术中的大数据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号