Ubiquitous and Transparent Security
Challenges and Applications
Herausgeber: Kumar, A Suresh; Maleh, Yassine; Dhanaraj, Rajesh Kumar
Ubiquitous and Transparent Security
Challenges and Applications
Herausgeber: Kumar, A Suresh; Maleh, Yassine; Dhanaraj, Rajesh Kumar
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
In an increasingly interconnected digital realm, "Ubiquitous and Transparent Security: Challenges and Applications" emerges as a guiding beacon through the intricate web of modern cybersecurity.
Andere Kunden interessierten sich auch für
- Arun SoniThe Cybersecurity Self-Help Guide156,99 €
- Information Technology Security and Risk Management157,99 €
- Michael MeloneDesigning Secure Systems101,99 €
- James BoneCognitive Risk146,99 €
- Andrew JenkinsonStuxnet to Sunburst157,99 €
- Nikki RobinsonMind the Tech Gap146,99 €
- Ravindra DasA Reference Manual for Data Privacy Laws and Cyber Frameworks156,99 €
-
-
-
In an increasingly interconnected digital realm, "Ubiquitous and Transparent Security: Challenges and Applications" emerges as a guiding beacon through the intricate web of modern cybersecurity.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 264
- Erscheinungstermin: 4. Juni 2024
- Englisch
- Abmessung: 234mm x 156mm x 18mm
- Gewicht: 572g
- ISBN-13: 9781032424071
- ISBN-10: 1032424079
- Artikelnr.: 70149453
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 264
- Erscheinungstermin: 4. Juni 2024
- Englisch
- Abmessung: 234mm x 156mm x 18mm
- Gewicht: 572g
- ISBN-13: 9781032424071
- ISBN-10: 1032424079
- Artikelnr.: 70149453
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Dr. Suresh Kumar Arumugam had graduated in Computer Science and Engineering (B.E) from Periyar University, Salem in 2003. Master's (M.E) in Computer Science and Engineering from Anna University, Trichy in 2010. He has been awarded Ph.D. in Computer Science and Engineering from Anna University, Chennai in 2017. He is having 17+ Teaching and Research experience in various institutions, and presently working as a Professor in the School of Computer Science and Engineering at Jain (Deemed to be University). He has published 20 SCI articles and more than 30 Scopus articles in peer reviewed journals. He has published 7 Indian Patent and received 1 Innovation Grand patent from Germany Patent. He has actively participated as Corresponding Editors in CRC Press, IGI Global Publications, and Benthom Science Publications and reviewers in some of the international journals and member of IEEE, IAENG and CSI societies. His main research interest is in the area of Wireless Sensor Network, Internet of Things, Artificial Intelligence and Machine Learning. Dr Rajesh Kumar Dhanaraj is a distinguished Professor at Symbiosis International (Deemed University) in Pune, India. Before joining Symbiosis International University, he served as a Professor at the School of Computing Science & Engineering at Galgotias University in Greater Noida, India. His academic and research achievements have earned him a place among the top 2% of scientists globally, a recognition bestowed upon him by Elsevier and Stanford University. He earned his B.E. degree in Computer Science and Engineering from Anna University Chennai, India, in 2007. Subsequently, he obtained his M.Tech degree from Anna University Coimbatore, India, in 2010. His relentless pursuit of knowledge culminated in a Ph.D. in Computer Science from Anna University, Chennai, India, in 2017. He has authored and edited over 50 books on various cutting-edge technologies and holds 21 patents. Furthermore, he has contributed over 100 articles and papers to esteemed refereed journals and international conferences, in addition to providing chapters for several influential books. Dr. Dhanaraj has shared his insights with the academic community by delivering numerous techs talks on disruptive technologies. He has forged meaningful partnerships with esteemed professors from top QS-ranked universities around the world, fostering a global network of academic excellence. His research interests encompass Machine Learning, Cyber-Physical Systems, and Wireless Sensor Networks. Dr. Dhanaraj's expertise in these areas has led to numerous research talks on Applied AI and Cyber Physical Systems at various esteemed institutions. Dr. Dhanaraj has earned the distinction of being a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE). He is also a member of the Computer Science Teacher Association (CSTA) and the International Association of Engineers (IAENG). Dr. Dhanaraj's commitment to academic excellence extends to his role as an Associate Editor and Guest Editor for renowned journals, including Elsevier Computers and Electrical Engineering, Human-centric Computing and Information Sciences, Emerald - International Journal of Pervasive Computing and Communications, and Hindawi - Mobile Information Systems. His expertise has earned him a position as an Expert Advisory Panel Member of Texas Instruments Inc., USA. Yassine Maleh is an associate professor of cybersecurity and IT governance at Sultan Moulay Slimane University, Morocco. He is the founding chair of IEEE Consultant Network Morocco and the founding president of the African Research Center of Information Technology & Cybersecurity. He is a senior member of IEEE and a member of the International Association of Engineers IAENG and The Machine Intelligence Research Labs. Dr. Maleh has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained network security. His research interests include information security and privacy, the Internet of things, network security, information system, and IT governance. He has published over 200 papers (book chapters, international journals, and conferences/workshops), 30 edited books, and 6 authored books. He is the editor-in-chief of the International Journal of Information Security and Privacy, and the International Journal of Smart Security Technologies (IJSST). He serves as an associate editor for IEEE Access (2019 Impact Factor 4.098), the International Journal of Digital Crime and Forensics (IJDCF), and the International Journal of Information Security and Privacy (IJISP). He is a series editor of Advances in Cybersecurity Management, by CRC Taylor & Francis. He was also a guest editor of a special issue on Recent Advances on Cyber Security and Privacy for Cloud-of-Things of the International Journal of Digital Crime and Forensics (IJDCF), Volume 10, Issue 3, July-September 2019. He has served and continues to serve on executive and technical program committees and as a reviewer of numerous international conferences and journals such as Elsevier Ad Hoc Networks, IEEE Network Magazine, IEEE Sensor Journal, ICT Express, and Springer Cluster Computing. He was the Publicity chair of BCCA 2019 and the General Chair of the MLBDACP 19 symposium and ICI2C'21 Conference. He received Publons Top 1% reviewer award for the years 2018 and 2019. Dr. A. Daniel is currently working as Associate Professor in ASET- CSE at Amity University, Gwalior, Madhya Pradesh, India. He has 12 years of experience on Academic field. He has completed his B.E and M.E both in Anna University, Chennai. He did Ph.D. at Shri Venkateshwara University. He has published 50 papers in various reputed journals and conferences. He is currently doing research on neural networks, deep learning, AI and ML and so on. He has membership in various professional bodies.
1. Understanding the security
privacy
and surveillance conundrum in "digital India"
2. A systemic review of RFID applications
broad casting areas
and public policy issues
3. A security and privacy approach for RFID-based wireless networks in ubiquitous computing
4. Privacy and security assurance in order to adopt a substantiation protocol in ultra-lightweight RFID
5. Blockchain-enabled intelligent Internet of Things system for secured healthcare applications
6. Visual efficient easy interactive (VEEI) understanding of teaching in education
7. Towards the 21st century: Solutions to the problems and pitfalls of mobile learning in education and training
8. Pseudorandom bit generator implementation using the dual-CLGG RWT algorithm
9. Steganography techniques securely communicate using cryptography
10. Ubiquitous and transparent security: Intelligent agent framework for secure patient-doctor modelling systems
11. Design challenges in cyber-physical systems: An overview of privacy threats in ubiquitous computing
12. The impact of ubiquitous computing on heterogeneous next generation networks
privacy
and surveillance conundrum in "digital India"
2. A systemic review of RFID applications
broad casting areas
and public policy issues
3. A security and privacy approach for RFID-based wireless networks in ubiquitous computing
4. Privacy and security assurance in order to adopt a substantiation protocol in ultra-lightweight RFID
5. Blockchain-enabled intelligent Internet of Things system for secured healthcare applications
6. Visual efficient easy interactive (VEEI) understanding of teaching in education
7. Towards the 21st century: Solutions to the problems and pitfalls of mobile learning in education and training
8. Pseudorandom bit generator implementation using the dual-CLGG RWT algorithm
9. Steganography techniques securely communicate using cryptography
10. Ubiquitous and transparent security: Intelligent agent framework for secure patient-doctor modelling systems
11. Design challenges in cyber-physical systems: An overview of privacy threats in ubiquitous computing
12. The impact of ubiquitous computing on heterogeneous next generation networks
1. Understanding the security
privacy
and surveillance conundrum in "digital India"
2. A systemic review of RFID applications
broad casting areas
and public policy issues
3. A security and privacy approach for RFID-based wireless networks in ubiquitous computing
4. Privacy and security assurance in order to adopt a substantiation protocol in ultra-lightweight RFID
5. Blockchain-enabled intelligent Internet of Things system for secured healthcare applications
6. Visual efficient easy interactive (VEEI) understanding of teaching in education
7. Towards the 21st century: Solutions to the problems and pitfalls of mobile learning in education and training
8. Pseudorandom bit generator implementation using the dual-CLGG RWT algorithm
9. Steganography techniques securely communicate using cryptography
10. Ubiquitous and transparent security: Intelligent agent framework for secure patient-doctor modelling systems
11. Design challenges in cyber-physical systems: An overview of privacy threats in ubiquitous computing
12. The impact of ubiquitous computing on heterogeneous next generation networks
privacy
and surveillance conundrum in "digital India"
2. A systemic review of RFID applications
broad casting areas
and public policy issues
3. A security and privacy approach for RFID-based wireless networks in ubiquitous computing
4. Privacy and security assurance in order to adopt a substantiation protocol in ultra-lightweight RFID
5. Blockchain-enabled intelligent Internet of Things system for secured healthcare applications
6. Visual efficient easy interactive (VEEI) understanding of teaching in education
7. Towards the 21st century: Solutions to the problems and pitfalls of mobile learning in education and training
8. Pseudorandom bit generator implementation using the dual-CLGG RWT algorithm
9. Steganography techniques securely communicate using cryptography
10. Ubiquitous and transparent security: Intelligent agent framework for secure patient-doctor modelling systems
11. Design challenges in cyber-physical systems: An overview of privacy threats in ubiquitous computing
12. The impact of ubiquitous computing on heterogeneous next generation networks