Security Issues in Communication Devices, Networks and Computing Models
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Security Issues in Communication Devices, Networks and Computing Models: Volume 1
Security Issues in Communication Devices, Networks and Computing Models: Volume 1

Security Issues in Communication Devices, Networks and Computing Models: Volume 1


     0     
5
4
3
2
1



Available


X
About the Book

The importance of addressing security issues in communication devices, networks, and computing models in Industry 5.0 cannot be overstated. Industry 5.0 represents the next phase in the evolution of manufacturing and industrial processes, characterized by increased connectivity, automation, and the integration of smart technologies. Here are several reasons why security is crucial in this context: Industry 5.0 involves the convergence of information technology (IT) and operational technology (OT), making industrial control systems susceptible to cyber threats. A breach in security could compromise critical infrastructure such as power grids, transportation systems, and water treatment plants. Securing computing models and networks is vital for protecting critical infrastructure and ensuring the safety and stability of essential services. Industry 5.0 encourages the use of advanced technologies such as the Industrial Internet of Things (IIoT) and edge computing, leading to increased data exchange and collaboration. Security issues could result in the theft or manipulation of intellectual property, proprietary designs, and sensitive business information. Robust security measures are necessary to safeguard intellectual property, maintain a competitive edge, and foster innovation within Industry 5.0 ecosystems. Communication devices and networks in Industry 5.0 transmit vast amounts of sensitive data, including production data, supply chain information, and operational metrics. Ensuring the integrity and confidentiality of this data is crucial for informed decision-making and maintaining a competitive advantage. Security breaches could lead to data manipulation, unauthorized access, and exposure of sensitive information, jeopardizing the trust of stakeholders and partners. Industry 5.0 involves interconnected supply chains, where multiple entities collaborate and share data. Weaknesses in communication devices and networks can be exploited to compromise the integrity of the entire supply chain, impacting product quality and safety. Securing communication channels and computing models is vital for maintaining the trustworthiness of the supply chain, ensuring product quality, and minimizing the risk of counterfeit components. In summary, addressing security issues in communication devices, networks, and computing models is fundamental to the successful implementation of Industry 5.0. It not only protects the assets and operations of organizations but also contributes to the overall safety, reliability, and sustainability of advanced industrial systems.

Table of Contents:
1. Clean Architecture in mobile development by practice, 2. Declarative iOS programming and architectural patterns, 3. Android malware prediction model using a hybrid machine learning approach for cybersecurity, 4. Dissecting PREFETCHX: Understanding cross-core attacks in hardware security, 5. Exploring the semantic web in healthcare, 6. Using data-driven approaches to enhance rider experience via Wi-Fi and Bluetooth, 7. Cooperative spectrum sensing using random forest algorithm over Rayleigh fading channel, 8. A novel approach to face recognition for smart attendance-monitoring systems, 9. Fingerprint-based security system for mitigating voting corruption, 10. PCG classification using scalogram and CNN classifier, 11. Unlocking AI’s potential for optimizing personalized treatment plans and predicting lung cancer, 12. Developing WBAN with secure data access and improved hybrid blockchain techniques, 13. Gesture recognition gloves for sign language translation, 14. Photoacoustic tomography: Breast cancer detection using point spread function, 15. A computationally efficient image encryption technique using a 4D chaotic system (CIE4DC) in a dynamic network, 16. Data science applications in healthcare data transmission, 17. Secure and scalable data analysis framework with quantum machine learning and blockchain, 18. Enhancing privacy in big data analytics with blockchain-based frameworks, 19. Enhancing network security management with scalable blockchain models, 20. Mathematical modeling for identification using fuzzy matching system, 21. Performance evaluation of a pre-compensated ROF system, 22. Robust and imperceptible dual watermarking for watershed images

About the Author :
Dr. Budati Anil Kumar received a Ph.D. Degree in Electronics and Communication Engineering from GITAM Deemed to be University, Hyderabad in 2019, and M.Tech. Degree from the LBRCE (JNTU Kakinada), Mylavaram in 2010 and B.Tech degree in VYCET (JNTU Hyderabad), Chirala in 2007. He has completed his PDF from ICSDI, UCSI University, Kuala Lumpur, Malaysia in 2024. He is currently working as an Associate Professor & RPAC Chair in ECE Department, Koneru Lakshmaiah Education Foundation (Deemed University), Aziz Nagar Campus, Hyderabad- 500075, Telangana State, India. He has more than 14 years of experience in teaching and six years of experience in research. Besides, he has published 60 research articles in highly reputed publisher journals and conferences whose indexing in SCIE, SCOPUS, etc. He acts as Guest Editor for Peer-to-Peer Networking Journal (Springer Publisher), Cluster Computing Journal (Springer Publisher), IJPCC (Emerald Publisher), IET CAAI Transactions on Intelligence Technology, IET Networks, SWCC Journal (Bentham science Publisher) and IJSCC (Inderscience Publisher), IJUWBCS (Inderscience Publisher) Journals. He has authored three text books which are published by Taylor and Francis’s publisher, U.K., and Wiley Publisher, U.K. He is a member of IEEE, IEI and IAENG since 2019 and has served as a reviewer for various international journals and conferences. He has conducted various FDP’s as a coordinator, which are funded by AICTE, DST New Delhi, India. He has organized & attended various FDPs and Conferences/workshops in India and abroad and also acted as speaker/session chair in various FDPs and Conferences. His current research interests include Cognitive Radio Networks, Software Defined Radio Networks, Artificial Intelligence, 6G emerging Technologies, Mulsemedia Computing and UAVs in 5G and 6G. Dr Alla Ramakrishna, currently working as the Professor & Principal of KL University, Hyderabad campus, is an accomplished Electronics and communications Engineer with a wealth of experience in academia, research, and industry. He holds a Doctorate in Wireless Communications and a Masters in Telecommunications & Electronics Engineering from Sheffield Hallam University, UK. He started his career as a Design Engineer at Sheffield Centre for Robotics and later in CPI Electronics Ltd and worked in an Engineering sales role at British Telecom. He has published papers in reputed journals. Dr A Ramakrishna sir has contributed to the development of 5G Technology. With his expertise in wireless communications, research and industry-academia partnerships, he can help drive innovation in this field and shape the future of communication technology while continuing to guide and support the next generation of engineers and researchers. Currently, he is guiding eight research scholars under him. He is also associated with several professional bodies such as ISTE (Indian Society for Technical Education), CSI (Computer Society of India), IEEE (Institution of Electrical and Electronics Engineers), IET (Institution of Engineering & Technology) Dr Ramakrishna has fulfilled his administrative and managerial roles with dedication and creativity. He demonstrated vision and an outstanding commitment to excellence in undergraduate & and postgraduate education in engineering, management, and arts. Dr A Ramakrishna has joined KL University as a faculty member in different roles in the areas of teaching, placements, internships, research, academics, administration, and Internal Quality Assessment Cell (IQAS). He was the founder-director of KLH Global Business School, Kondapur, and is one of the key person for the establishment of KL University campus in Hyderabad. Dr A Ramakrishna during his tenure as Director (Placements & Internships) has worked in different capacities and also achieved in bridging the gap between the industry and academia by placing more than 20,000 students for internships in different companies in the last 10 years. He is the key person in getting several research and consultancy projects to the University. He has conducted various international conferences, workshops and programs in imparting good knowledge to the students. He is the strength behind taking the placements to greater heights at KL University. He has established KL Placements and Industry interaction offices in Chennai, Bangalore & Pune with the objective of placing our students in all the premier companies in South India. He has established the PEGA UAP & Centre of Excellence in Automation Anywhere, a tool for Robotic Process Automation. He has the credit of placing more than 10000 students across many top MNC companies. He has contact with more than 500 recruiters across both IT & Core areas. He has received awards from various Corporate companies and from the Confederation of Indian Industry for conducting the best campus drives during the past 10 years. Dr A Ramakrishna has been honored with the Best Academic Leadership Award at IKON – Talent Acquisition conclave held at T-Hub, Madhapur on 16th December, 2022. Dr. Goutham Makkena is an Associate Professor in the Department of Electronics and Communication Engineering (ECE) at KL University, Hyderabad Campus, where he has made significant strides in both teaching and research. Holding a Master’s degree and a PhD in Microelectronics from the Birla Institute of Technology and Science - Pilani, Hyderabad Campus, his academic journey is marked by a deep-rooted passion for advancing Microelectronics. Before embarking on his academic career, he gained valuable industry experience as a Software Engineer at Infosys Technologies Pvt Ltd for two years and as a Field Engineer at Microsemi SOC division for six months, laying a solid foundation for his research endeavors. His research interests are focused on the design and implementation of pulse shaping filters and the innovative use of Carbon Nanotube Field-Effect Transistors (CNTFETs) for developing ternary logic circuits. A contributor to GSOC2022, he is deeply committed to the open-source community, with a keen interest in open-source FPGA and Open Lane, aiming to further the development of open-source hardware. Additionally, his expertise in creating interactive H5P content demonstrates his dedication to enhancing learning through interaction. At KL University, he has also established a drone lab, furthering practical learning and research in drone technology, highlighting his commitment to integrating hands-on experience with academic rigor. I, George Ghinea, am a Professor in the Department of Computer Science at Brunel University London. I obtained my BSc. Degree with Computer Science and Mathematics majors from the University of the Witwatersrand, South Africa. I later went on to obtain BSc. (Hons.) and MSc. Degrees, both in Computer Science, from the same university. I was awarded my PhD – Quality of Perception: An Essential Facet of Multimedia Communications - from the University of Reading, UK, in 2000. In it, I proposed the Quality of Perception metric, a precursor of the Quality of Experience (QoE) concept now widely known. However, whilst QoE is still a concept, QoP is a concrete metric. Thus, recognising the infotainment duality of multimedia, QoP not only characterises the subjective enjoyment associated with experiencing multimedia presentations, but also how such presentations aid a person\'s ability to assimilate informational content. My research activities lie at the confluence of Computer Science, Media and Psychology. In particular, my work focuses on the area of perceptual multimedia quality and how one builds end-to-end communication systems incorporating user perceptual requirements. I have applied my expertise in areas such as eye-tracking, telemedicine, multi-modal interaction, and ubiquitous and mobile computing. I am particularly interested in building human-centred e-systems, particularly integrating human perceptual requirements. My work has been funded by both national and international funding bodies – all of it being collaborative work with other teams and stakeholders I have been privileged to be involved with. I have also been honoured to supervise 33 PhD students to completion and to have published over 350 high-quality research articles with them and other research collaborators. Currently, my research pursuits are centered on extending the notion of multimedia with that of mulsemedia – a term which I have put forward to denote multiple sensorial media, ie. media applications that go beyond engaging the by now traditional auditory and visual senses, engaging three of our other human in a realistic manner akin to our experiences of everyday life.


Best Sellers


Product Details
  • ISBN-13: 9781032832111
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: CRC Press
  • Height: 254 mm
  • No of Pages: 238
  • Weight: 630 gr
  • ISBN-10: 1032832118
  • Publisher Date: 09 May 2025
  • Binding: Hardback
  • Language: English
  • Sub Title: Volume 1
  • Width: 178 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security Issues in Communication Devices, Networks and Computing Models: Volume 1
Taylor & Francis Ltd -
Security Issues in Communication Devices, Networks and Computing Models: Volume 1
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Issues in Communication Devices, Networks and Computing Models: Volume 1

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!