This book investigates perturbation-based privacy in crowdsensing systems. The authors first present an explicit overview of crowdsensing systems and privacy challenges and briefly discuss how the n……続きを見る
Human digital twin (HDT) is a transformative technology poised to transform various human-centric systems. With its potential applications in personalized healthcare, HDT promises swift, precise, an……続きを見る
This brief explores the utilization of large antenna arrays in massive multiple-input-multiple-output (MIMO) for both interference suppression, where it can improve cell-edge user rates, and for wir……続きを見る
This brief covers the emerging area of wireless sensor network (WSN)-based structural health monitoring (SHM) systems, and introduces the authors’ WSN-based platform called SenetSHM. It helps the re……続きを見る
This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to softwa……続きを見る
著者:Saleh Faruque
出版社: Springer International Publishing
発売日: 2015年12月29日
This book introduces Radio Frequency Propagation to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applicati……続きを見る
著者:Saleh Faruque
出版社: Springer International Publishing
発売日: 2015年12月29日
This book introduces Radio Frequency Source Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applica……続きを見る
著者:Saleh Faruque
出版社: Springer International Publishing
発売日: 2016年07月27日
This book introduces Radio Frequency Modulation to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applicatio……続きを見る
This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a n……続きを見る
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9–10, 2……続きを見る
This book investigates compressive sensing techniques to provide a robust and general framework for network data analytics. The goal is to introduce a compressive sensing framework for missing data ……続きを見る
This book investigates intelligent network resource management for IoV, with the objective of maximizing the communication and computing performance of vehicle users. Focusing on two representative ……続きを見る
This book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryptio……続きを見る
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide an……続きを見る
This brief provides a review of the evolution of optical fiber sensing solutions and related applications. Unique production methods are presented and discussed, highlighting their evolution and ana……続きを見る
This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally avail……続きを見る
This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles.
To enable efficient and reliable Internet connection f……続きを見る
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and b……続きを見る
Das vorliegende Buch richtet sich an Verantwortliche aus kleinen, mittleren und großen Unternehmen und beschreibt die Vorgehensweise zur Implementierung eines Datenschutzmanagementsystems (DSMS). Di……続きを見る
As an important enabler for changing people’s lives, advances in artificial intelligence (AI)-based applications and services are on the rise, despite being hindered by efficiency and latency issues. ……続きを見る
Auf Basis empirischer Daten von 45 konkreten Anwendungsfällen identifiziert dieses essential Nutzenpotentiale cyber-physischer Systeme im Kontext industrieller Dienstleistungen. Die Autoren nennen I……続きを見る
This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It presents MTD-based research efforts to protect clo……続きを見る
Examine the challenges of 4G in the light of impending and crucial future communication needs, and review the lessons learned from an implementation and system operation perspective with an eye towa……続きを見る
This brief presents the challenges and solutions for VANETs’ security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network……続きを見る
This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security.……続きを見る
This SpringerBrief explores the advantage of relaying techniques in addressing the increasing demand for high data rates and reliable services over the air. It demonstrates how to design cost-effect……続きを見る
This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, w……続きを見る
This book investigates the modeling and optimization issues in mobile social networks (MSNs). Firstly, the architecture and applications of MSNs are examined. The existing works on MSNs are reviewed……続きを見る
See how the principles of Service Science govern the dynamics driving the adoption of cloud computing in the industry.
Cloud as Service shows you how the evolution of enterprise computing platforms ……続きを見る
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile user……続きを見る