Research Advances in Network Technologies
Volume 2
Herausgeber: Verma, Anshul; Verma, Pradeepika
Research Advances in Network Technologies
Volume 2
Herausgeber: Verma, Anshul; Verma, Pradeepika
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
It's important to stay up to date on network technology developments. This book will present the most recent and leading research work in the field of network technologies in order to achieve solutions for various problems exist in this domain.
Andere Kunden interessierten sich auch für
- Security Implementation in Internet of Medical Things153,99 €
- Web 3.0152,99 €
- Peter Simon SapatySpatial Grasp as a Model for Space-Based Control and Management Systems153,99 €
- Fadi Al-TurjmanSmart Grid in Iot-Enabled Spaces142,99 €
- Blockchain and Digital Twin Enabled IoT Networks163,99 €
- Securing Cyber-Physical Systems186,99 €
- Yufeng WangDevice-To-Device Based Proximity Service285,99 €
-
-
-
It's important to stay up to date on network technology developments. This book will present the most recent and leading research work in the field of network technologies in order to achieve solutions for various problems exist in this domain.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 268
- Erscheinungstermin: 26. September 2024
- Englisch
- Abmessung: 234mm x 156mm x 18mm
- Gewicht: 576g
- ISBN-13: 9781032561196
- ISBN-10: 103256119X
- Artikelnr.: 70147439
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 268
- Erscheinungstermin: 26. September 2024
- Englisch
- Abmessung: 234mm x 156mm x 18mm
- Gewicht: 576g
- ISBN-13: 9781032561196
- ISBN-10: 103256119X
- Artikelnr.: 70147439
Dr. Anshul Verma received M.Tech. and Ph.D. degrees in Computer Science & Engineering from ABV-Indian Institute of Information Technology and Management Gwalior, India. He has done Post-doctorate from Indian Institute of Technology Kharagpur, India. Currently, he is serving as Assistant Professor in Department of Computer Science, Institute of Science, Banaras Hindu University Varanasi, India. He has also served as faculty member in Computer Science & Engineering Department at Motilal Nehru National Institute of Technology (MNNIT) Allahabad and National Institute of Technology (NIT) Jamshedpur, India. His research interests include IoT, Mobile ad-hoc networks, Distributed systems, Formal verification, and Mobile computing. He is serving as Editor of the Journal of Scientific Research of the Banaras Hindu University. Dr. Pradeepika Verma received her Ph.D. degree in Computer Science and Engineering from the Indian Institute of Technology (ISM) Dhanbad, India. She has received M.Tech in Computer Science and Engineering from Banasthali University, Rajasthan, India. Currently, she is working as a Faculty Fellow in Technical Innovation Hub at Indian Institute of Technology, Patna, India. She has worked as a Post-Doctoral Fellow in Department of Computer Science and Engineering at Indian Institute of Technology (BHU), Varanasi, India. She has also worked as an Assistant Professor in the Department of Computer Science and Engineering at Pranveer Singh Institute of Technology, Kanpur, India, and as a Faculty Member in the Department of Computer Application at the Institute of Engineering and Technology, Lucknow, India. Her current research interests include natural language processing, optimization approaches, information retrieval and Mobile ad-hoc networks.
List of Contributors. Preface. Acknowledgements. 1. Need for Architecture
Recovery in OSS: A Decade Study. 2. SDN and NFV Security Challenges and
Solutions for Minimizing the Failures in IoT Network: Literature Review. 3.
Android Malware Detection: A Comprehensive Review. 4. Threats And Awareness
of Cybersecurity. 5. A Review on The Security of Routing Mechanism For
WSN-IoT. 6. Cloud Storage: Implementing A Third-Party Public Auditing
Scheme. 7. Design of Smart Agricultural System For Prediction And
Recommendation System Using IoT. 8. Network Security in Web Development
Technology. 9. Applications of Blockchain Technology in Healthcare. 10.
Design And Analysis on Dh Approach Based Network Security And Cryptography.
11. Detection of A Facemask in Real-Time Using Deep Learning Methods:
Prevention of Covid 19. 12. Cyberbullying Detection From Bangla Text on
Social Media. 13. An Insight Into Quantum Internet: A Review
Recovery in OSS: A Decade Study. 2. SDN and NFV Security Challenges and
Solutions for Minimizing the Failures in IoT Network: Literature Review. 3.
Android Malware Detection: A Comprehensive Review. 4. Threats And Awareness
of Cybersecurity. 5. A Review on The Security of Routing Mechanism For
WSN-IoT. 6. Cloud Storage: Implementing A Third-Party Public Auditing
Scheme. 7. Design of Smart Agricultural System For Prediction And
Recommendation System Using IoT. 8. Network Security in Web Development
Technology. 9. Applications of Blockchain Technology in Healthcare. 10.
Design And Analysis on Dh Approach Based Network Security And Cryptography.
11. Detection of A Facemask in Real-Time Using Deep Learning Methods:
Prevention of Covid 19. 12. Cyberbullying Detection From Bangla Text on
Social Media. 13. An Insight Into Quantum Internet: A Review
List of Contributors. Preface. Acknowledgements. 1. Need for Architecture
Recovery in OSS: A Decade Study. 2. SDN and NFV Security Challenges and
Solutions for Minimizing the Failures in IoT Network: Literature Review. 3.
Android Malware Detection: A Comprehensive Review. 4. Threats And Awareness
of Cybersecurity. 5. A Review on The Security of Routing Mechanism For
WSN-IoT. 6. Cloud Storage: Implementing A Third-Party Public Auditing
Scheme. 7. Design of Smart Agricultural System For Prediction And
Recommendation System Using IoT. 8. Network Security in Web Development
Technology. 9. Applications of Blockchain Technology in Healthcare. 10.
Design And Analysis on Dh Approach Based Network Security And Cryptography.
11. Detection of A Facemask in Real-Time Using Deep Learning Methods:
Prevention of Covid 19. 12. Cyberbullying Detection From Bangla Text on
Social Media. 13. An Insight Into Quantum Internet: A Review
Recovery in OSS: A Decade Study. 2. SDN and NFV Security Challenges and
Solutions for Minimizing the Failures in IoT Network: Literature Review. 3.
Android Malware Detection: A Comprehensive Review. 4. Threats And Awareness
of Cybersecurity. 5. A Review on The Security of Routing Mechanism For
WSN-IoT. 6. Cloud Storage: Implementing A Third-Party Public Auditing
Scheme. 7. Design of Smart Agricultural System For Prediction And
Recommendation System Using IoT. 8. Network Security in Web Development
Technology. 9. Applications of Blockchain Technology in Healthcare. 10.
Design And Analysis on Dh Approach Based Network Security And Cryptography.
11. Detection of A Facemask in Real-Time Using Deep Learning Methods:
Prevention of Covid 19. 12. Cyberbullying Detection From Bangla Text on
Social Media. 13. An Insight Into Quantum Internet: A Review