Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
This open-access book aims to highlight the coming surge of 5G network-based applications and predicts that the centralized networks and their current capacity will be incapable of meeting the demands. The book emphasizes the benefits and challenges associated with the integration of 5G networks with varied applications. Further, the book gathers and investigates the most recent 5G-based research solutions that handle security and privacy threats while considering resource-constrained wireless devices. The information, applications, and recent advances discussed in this book will serve to be of immense help to practitioners, database professionals, and researchers.
Bharat Bhushan is an Assistant Professor of the Department of Computer Science and Engineering (CSE) at the School of Engineering and Technology, Sharda University, Greater Noida, India. He is an alumnus of Birla Institute of Technology, Mesra, Ranchi, India. He received his B. Tech. in Computer Science and Engineering in 2012, an M. Tech. in Information Security in 2015, and a Ph.D. in Computer Science and Engineering in 2021 from Birla Institute of Technology, Mesra, India. He has published over 80 research papers in various renowned International conferences and Journals. He has also contributed over 25 book chapters and has edited 11 books. He is a member of numerous renowned bodies such as IEEE, IAENG, CSTA, SCIEI, IAE, and UACEE.
Sudhir Kumar Sharma is currently a Professor and Head of the Department of Computer Science, Institute of Information Technology & Management affiliated with GGSIPU, New Delhi, India. He has extensiveexperience of over 21 years in the field of Computer Science and Engineering. He obtained his Ph.D. degree in Information Technology in 2013 from USICT, Guru Gobind Singh Indraprastha University, New Delhi, India. Dr. Sharma received his M. Tech degree in Computer Science & Engineering in 1999 from the Guru Jambheshwar University, Hisar, India, and an M.Sc. degree in Physics from the University of Roorkee (now IIT Roorkee), Roorkee, in 1997. His research interests are machine learning, data mining, and security. Dr. Sharma has published over 60 research papers in various prestigious International Journals and Conferences. He authored and edited 7 books in the fields of IoT, WSN, blockchain, and cyber-physical systems.
Raghvendra Kumar is an Associate Professor in Computer Science and Engineering Department at GIET University, India. He received B. Tech, M.Tech, and Ph.D. in Computer Science and Engineering, India, and Postdoc Fellow from theInstitute of Information Technology, Virtual Reality, and Multimedia, Vietnam. He has published a number of research papers in international journals and conferences. He also published 13 chapters in edited books published by renowned publishers. His research areas are computer networks, data mining, cloud computing and secure multiparty computations, theory of computer science, and design of algorithms. He authored and edited 23 computer science books on IoT, data mining, biomedical engineering, big data, and robotics.
Ishaani Priyadarshini is a lecturer at the School of Information, UC Berkeley, USA, Ph.D., and Master's Degree in Cybersecurity from the University of Delaware, USA. Prior to that, she completed her Bachelor's degree in Computer Science Engineering and a Master’s degree in Information Security from Kalinga Institute of Industrial Technology, India. She has authored several book chapters for reputed publishers and is also anauthor of several publications for SCIE-indexed journals. As a certified reviewer, she conducts peer reviews of research papers for prestigious publishers and is a part of the Editorial Board for the International Journal of Information Security and Privacy (IJISP). Her areas of research include cybersecurity, artificial intelligence, and HCI.
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.