Security and Privacy-Preserving Techniques in Wireless Robotics (eBook, PDF)
Redaktion: Kumar Tyagi, Amit; Malik, Shaveta; Rekha, Gillala; Sreenath, N.; Kaklauskas, A.; Abraham, Ajith
48,95 €
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
48,95 €
Als Download kaufen
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
24 °P sammeln
Security and Privacy-Preserving Techniques in Wireless Robotics (eBook, PDF)
Redaktion: Kumar Tyagi, Amit; Malik, Shaveta; Rekha, Gillala; Sreenath, N.; Kaklauskas, A.; Abraham, Ajith
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The reference text covers several security and privacy aspects and concerns with respect to wireless robotics. It will be an ideal reference text for senior undergraduate, graduate students, and professional in the fields of electrical engineering, electronics and communication engineering, and computer science.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 83.48MB
The reference text covers several security and privacy aspects and concerns with respect to wireless robotics. It will be an ideal reference text for senior undergraduate, graduate students, and professional in the fields of electrical engineering, electronics and communication engineering, and computer science.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 352
- Erscheinungstermin: 17. August 2022
- Englisch
- ISBN-13: 9781000510171
- Artikelnr.: 64700894
- Verlag: Taylor & Francis
- Seitenzahl: 352
- Erscheinungstermin: 17. August 2022
- Englisch
- ISBN-13: 9781000510171
- Artikelnr.: 64700894
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Amit Kumar Tyagi Amit Kumar Tyagi is Assistant Professor (Senior Grade), and Senior Researcher at Vellore Institute of Technology (VIT), Chennai Campus, India. He received his Ph.D. Degree in 2018 from Pondicherry Central University, India. He joined the Lord Krishna College of Engineering, Ghaziabad (LKCE) for the periods of 2009-2010, and 2012-2013. He was an Assistant Professor and Head- Research, Lingaya's Vidyapeeth (formerly known as Lingaya's University), Faridabad, Haryana, India in 2018-2019. His current research focuses on Machine Learning with Big data, Blockchain Technology, Data Science, Cyber Physical Systems, Smart and Secure Computing and Privacy. He has contributed to several projects such as "AARIN" and "P3- Block" to address some of the open issues related to the privacy breaches in Vehicular Applications (such as Parking) and Medical Cyber Physical Systems (MCPS). Also, he has published more than 15 patents in the area of Deep Learning, Internet of Things, Cyber Physical Systems and Computer Vision. Recently, he has awarded best paper award for paper titled "A Novel Feature Extractor Based on the Modified Approach of Histogram of oriented Gradient", ICCSA 2020, Italy (Europe). He is a regular member of the ACM, IEEE, MIRLabs, Ramanujan Mathematical Society, Cryptology Research Society, and Universal Scientific Education and Research Network, CSI and ISTE. Ajith Abraham Ajith Abraham is the Director of Machine Intelligence Research Labs (MIR Labs), a Not-for-Profit Scientific Network for Innovation and Research Excellence connecting Industry and Academia. As an Investigator and Co-Investigator, he has won research grants worth over 100+ Million US$ from Australia, USA, EU, Italy, Czech Republic, France, Malaysia and China. His research focuses on real world problems in the fields of machine intelligence, cyber-physical systems, Internet of things, network security, sensor networks, Web intelligence, Web services, and data mining. He is the Chair of the IEEE Systems Man and Cybernetics Society Technical Committee on Soft Computing. He is the editor-in-chief of Engineering Applications of Artificial Intelligence (EAAI) and serves/served on the editorial board of several International Journals. He received his Ph.D. Degree in Computer Science from Monash University, Melbourne, Australia. Arturas Kaklauskas Arturas Kaklauskas is a Professor at Vilnius Gediminas Technical University, in Lithuania. His areas of interest include affective computing, neuro-marketing, intelligent tutoring systems, affective intelligent tutoring systems, massive open online courses (MOOCS), affective Internet of Things, smart built environment, intelligent event prediction, opinion mining, intelligent decision support systems, life cycle analyses of built environments, energy, climate change, resilience management, healthy houses, sustainable built environments, big data and text analytics, intelligent library, and internet of things. He is Editor in Chief of the Journal of Civil Engineering and Management, Editor of Engineering Applications of Artificial Intelligence, and Associate Editor of the Ecological Indicators Journal. His publications include nine books. The Belarusian State Technological University (Minsk, Belarus) has awarded him an Honorary Doctorate. Niladhuri Sreenath Niladhuri Sreenath is Professor in Computer Science and Information Technology at Pondicherry Engineering College affiliated to Pondicherry University, India. His primary research interests lie in WDM Optical Networks, and Privacy and Trust. He obtained his Ph. D. in Computer Science from the Indian Institute of Technology, Madras, India. Dr.G.Rekha, Dr.G.Rekha, is working as an Associate Professor, CSE Department, KL University, Hyderabad, Telangana India.She has more than 15+ years of teaching and research experience. She is having many publications (including patents) in National and International conferences and journals and also served as a reviewer for same. She is a member for ACM, and IEEE. Her area of interest are Deep Learning, Internet of Things, Cyber Physical Systems and Computer Vision. Shaveta Malik Shaveta Malik is working as an Associate Professor in Computer Engineering Department (NBA accredited), Terna Engineering College, Nerul. She has more than 9 years of teaching and research experience. She has completed her PhD from Lingaya's University, Faridabad. She had been editor many International conferences and Journal. She is having many publications (including patents) in National and International conferences and journals and also served as a reviewer for same. She is a member for ACM, and IEEE.
1. Software Robotics Driven Goods And Services Tax Reconciliation And
Matching. 2. Enhanced Intrusion Detection Response And Mitigating Attacks
Using Umpiring Security Models For WSN. 3. Cache Memory Design for Single
Bit Architecture for Core ITM Processors. 4. A Simulation - Hardware based
study of Electric Vehicle charging station using Solar-PhotoVoltaic energy
in Gujarat. 5. Comparison of spiral and metamaterial inspired patch antenna
for 4G LTE applications. 6. Comparative Analysis For Moving Object
Detection in Vibrant Background using SVM, LS SVM and Random Forest
Classifier. 7. A Survey on Distributed Denial of Service Attack Detection.
8. Emerging Trends in Power Plants with Digital Solutions. 9. Recent Trends
in Internet of Things, Challenges and Opportunities. 10. Privacy Breaches
through Cyber Vulnerabilities: Critical Issues, Open Challenges and
Possible Countermeasures for Future. 11. Machine Learning Algorithms for
Bitcoin Price Prediction. 12. Blockchain Enabled Product Tracking for
Supply Chain Management. 13. Role of Robots In Health Care Monitoring
System. 14. Remote User Authentication using Camellia Encryption for
Network based applications. 15. A Hybrid optimization model for efficient
node localization in Wireless Sensor Networks. 16. Machine Learning based
IoT models and Analysis.
Matching. 2. Enhanced Intrusion Detection Response And Mitigating Attacks
Using Umpiring Security Models For WSN. 3. Cache Memory Design for Single
Bit Architecture for Core ITM Processors. 4. A Simulation - Hardware based
study of Electric Vehicle charging station using Solar-PhotoVoltaic energy
in Gujarat. 5. Comparison of spiral and metamaterial inspired patch antenna
for 4G LTE applications. 6. Comparative Analysis For Moving Object
Detection in Vibrant Background using SVM, LS SVM and Random Forest
Classifier. 7. A Survey on Distributed Denial of Service Attack Detection.
8. Emerging Trends in Power Plants with Digital Solutions. 9. Recent Trends
in Internet of Things, Challenges and Opportunities. 10. Privacy Breaches
through Cyber Vulnerabilities: Critical Issues, Open Challenges and
Possible Countermeasures for Future. 11. Machine Learning Algorithms for
Bitcoin Price Prediction. 12. Blockchain Enabled Product Tracking for
Supply Chain Management. 13. Role of Robots In Health Care Monitoring
System. 14. Remote User Authentication using Camellia Encryption for
Network based applications. 15. A Hybrid optimization model for efficient
node localization in Wireless Sensor Networks. 16. Machine Learning based
IoT models and Analysis.
1. Software Robotics Driven Goods And Services Tax Reconciliation And
Matching. 2. Enhanced Intrusion Detection Response And Mitigating Attacks
Using Umpiring Security Models For WSN. 3. Cache Memory Design for Single
Bit Architecture for Core ITM Processors. 4. A Simulation - Hardware based
study of Electric Vehicle charging station using Solar-PhotoVoltaic energy
in Gujarat. 5. Comparison of spiral and metamaterial inspired patch antenna
for 4G LTE applications. 6. Comparative Analysis For Moving Object
Detection in Vibrant Background using SVM, LS SVM and Random Forest
Classifier. 7. A Survey on Distributed Denial of Service Attack Detection.
8. Emerging Trends in Power Plants with Digital Solutions. 9. Recent Trends
in Internet of Things, Challenges and Opportunities. 10. Privacy Breaches
through Cyber Vulnerabilities: Critical Issues, Open Challenges and
Possible Countermeasures for Future. 11. Machine Learning Algorithms for
Bitcoin Price Prediction. 12. Blockchain Enabled Product Tracking for
Supply Chain Management. 13. Role of Robots In Health Care Monitoring
System. 14. Remote User Authentication using Camellia Encryption for
Network based applications. 15. A Hybrid optimization model for efficient
node localization in Wireless Sensor Networks. 16. Machine Learning based
IoT models and Analysis.
Matching. 2. Enhanced Intrusion Detection Response And Mitigating Attacks
Using Umpiring Security Models For WSN. 3. Cache Memory Design for Single
Bit Architecture for Core ITM Processors. 4. A Simulation - Hardware based
study of Electric Vehicle charging station using Solar-PhotoVoltaic energy
in Gujarat. 5. Comparison of spiral and metamaterial inspired patch antenna
for 4G LTE applications. 6. Comparative Analysis For Moving Object
Detection in Vibrant Background using SVM, LS SVM and Random Forest
Classifier. 7. A Survey on Distributed Denial of Service Attack Detection.
8. Emerging Trends in Power Plants with Digital Solutions. 9. Recent Trends
in Internet of Things, Challenges and Opportunities. 10. Privacy Breaches
through Cyber Vulnerabilities: Critical Issues, Open Challenges and
Possible Countermeasures for Future. 11. Machine Learning Algorithms for
Bitcoin Price Prediction. 12. Blockchain Enabled Product Tracking for
Supply Chain Management. 13. Role of Robots In Health Care Monitoring
System. 14. Remote User Authentication using Camellia Encryption for
Network based applications. 15. A Hybrid optimization model for efficient
node localization in Wireless Sensor Networks. 16. Machine Learning based
IoT models and Analysis.