The Next Generation Vehicular Networks Modeling Algorithm And Applications


Download The Next Generation Vehicular Networks Modeling Algorithm And Applications PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get The Next Generation Vehicular Networks Modeling Algorithm And Applications book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

The Next Generation Vehicular Networks, Modeling, Algorithm and Applications


The Next Generation Vehicular Networks, Modeling, Algorithm and Applications

Author: Zhou Su

language: en

Publisher: Springer Nature

Release Date: 2020-11-12


DOWNLOAD





This book proposes the novel network envisions and framework design principles, in order to systematically expound the next generation vehicular networks, including the modelling, algorithms and practical applications. It focuses on the key enabling technologies to design the next generation vehicular networks with various vehicular services to realize the safe, convenient and comfortable driving. The next generation vehicular networks has emerged to provide services with a high quality of experience (QoE) to vehicles, where both better network maintainability and sustainability can be obtained than before. The framework design principles and related network architecture are also covered in this book. Then, the series of research topics are discussed including the reputation based content centric delivery, the contract based mobile edge caching, the Stackelberg game model based computation offloading, the auction game based secure computation offloading, the bargain game based security protection and the deep learning based autonomous driving. Finally, the investigation, development and future works are also introduced for designing the next generation vehicular networks. The primary audience for this book are researchers, who work in computer science and electronic engineering. Professionals working in the field of mobile networks and communications, as well as engineers and technical staff who work on the development or the standard of computer networks will also find this book useful as a reference.

Mobile Edge Computing


Mobile Edge Computing

Author: Anwesha Mukherjee

language: en

Publisher: Springer Nature

Release Date: 2021-11-18


DOWNLOAD





Mobile Edge Computing (MEC) provides cloud-like subscription-oriented services at the edge of mobile network. For low latency and high bandwidth services, edge computing assisted IoT (Internet of Things) has become the pillar for the development of smart environments and their applications such as smart home, smart health, smart traffic management, smart agriculture, and smart city. This book covers the fundamental concept of the MEC and its real-time applications. The book content is organized into three parts: Part A covers the architecture and working model of MEC, Part B focuses on the systems, platforms, services and issues of MEC, and Part C emphases on various applications of MEC. This book is targeted for graduate students, researchers, developers, and service providers interested in learning about the state-of-the-art in MEC technologies, innovative applications, and future research directions.

Next-Generation Enterprise Security and Governance


Next-Generation Enterprise Security and Governance

Author: Mohiuddin Ahmed

language: en

Publisher: CRC Press

Release Date: 2022-04-19


DOWNLOAD





The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.