The ever increasing use of computers, networks and the Internet has led to the need for regulation in the fields of cybercrime, cybersecurity and national security. This SpringerBrief provides insight
This book presents the details of the BONUS algorithm and its real world applications in areas like sensor placement in large scale drinking water networks, sensor placement in advanced power systems,
The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques t
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in r
Climate Resilient Agriculture for Ensuring Food Security comprehensively deals with important aspects of climate resilient agriculture for food security using adaptation and mitigation measures. Clima
This book investigates the possible circuit solutions to overcome the temperature and supply voltage-sensitivity of fully-integrated time references for ultra-low-power communication in wireless senso
This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also int
This book introduces resource-aware data fusion algorithms that generate inferences by combining data from multiple sources techniques useful in centralized and distributed systems to overcome sensor
The present book is devoted to problems of adaptation of artificial neural networks to robust fault diagnosis schemes. It presents neural networks-based modelling and estimation techniques used for de
With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing "smart cities" and addressing many important transportation problems s
Focusing on everything from the basics of opportunistic networks to modeling them, communicating through them and using them for collaboration and cooperation, this volume covers all aspects of the to
This book constitutes the refereed proceedings of the 11th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2012 held in Belgrade, Serbia, July 9-11, 2012. The 36 revised f
Driven by the increasing demand for capacity and Quality of Service in wireless cellular networks and motivated by the distributed antenna system, the authors proposed a cooperative communication arch
Service provisioning in ad hoc networks is challenging given the difficulties of communicating over a wireless channel and the potential heterogeneity and mobility of the devices that form the network
Traditional database management systems, widely used today, are not well-suited for a class of emerging applications, such as computer network management, homeland security, sensor computing, and env
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-comm
Atmospheric ice takes a wide range of fascinating forms, all beautiful in their own ways but many posing severe risk to the security of overhead networks for electric power, communications and other
An Introduction to Mathematical Cryptography provides an introduction to public key cryptography and underlying mathematics that is required for the subject. Each of the eight chapters expands on a sp
The first comprehensive text on microhotplate-based chemical sensor systems in CMOS-technology covers all aspects of successful sensor prototyping: theoretical considerations for modelling, controller
Mobile communications and next generation wireless networks emerge as new distribution channels for the media. This development offers exciting new opportunities for media companies: the mobile commun
This book provides an overview of model-based environmental visual perception for humanoid robots. The visual perception of a humanoid robot creates abidirectional bridgeconnecting sensor signals with
This textbook provides engineering students with instruction on processing signals encountered in speech, music, and wireless communications using software or hardware by employing basic mathematical
This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding
This inspiring textbook provides an essential introduction to wireless technologies for sensors, explores the potential use of sensors for numerous applications, and utilizes probability theory and ma
This SpringerBrief focuses on the coexistence concerns emerging in LTE networks using unlicensed frequency bands. It provides a comprehensive review on LTE networks and their unavoidable need for enha
??This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution, the methodologies and t
This book constitutes the joint refereed proceedings of the 15th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2015, and the 8th Conference on Intern
The foremost aim of the present study was the development of a tool to detect daily deforestation in the Amazon rainforest, using satellite images from the MODIS/TERRA sensor and Artificial Neural Net
This SpringerBrief presents adaptive resource allocation schemes for secondary users for dynamic spectrum access (DSA) in cognitive radio networks (CRNs) by considering Quality-of-Service requirements
Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake,
This book constitutes the joint refereed proceedings of the 14th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2014, and the 7th Conference on Intern
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common me
Through proper engagement, identity-based conflict enhances and develops identity as a vehicle to promote creative collaboration between individuals, the groups they constitute and the systems they fo
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The
This book integrates history of science and technology with modern social network theory. Using examples from the history of machines, as well as case studies from wireless, radio and chaos theory, th
The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows
Wireless Communication Technologies: New Multimedia Systems is based on a selection of the best papers presented at the recent International Symposium on Personal, Indoor and Mobile Radio Communica
The broadband wireless communications field is growing at an explosive rate, stimulated by a host of important emerging applications ranging from 3G, 4G and wireless LAN. For system planners and de
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013.
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The