Muutke küpsiste eelistusi
  • Formaat - PDF+DRM
  • Hind: 88,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help build intuition to apply these concepts to a broad range of system security domains toward dimensioning of next generations of mobiles crowdsensing applications. This book offers vigorous techniques as well as new insights for both beginners and seasoned professionals. It reflects on recent advances and research achievements.

Technical topics discussed in the book include but are not limited to:

  • Risks affecting crowdsensing platforms
  • Spatio-temporal privacy of crowdsourced applications
  • Differential privacy for data mining crowdsourcing
  • Blockchain-based crowdsourcing
  • Secure wireless mobile crowdsensing.

This book is accessible to readers in mobile computer/communication industries as well as academic staff and students in computer science, electrical engineering, telecommunication systems, business information systems, and crowdsourced mobile app developers.



This book is a concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures.

1. The Importance of Crowdsourcing
2. Spatio-temporal Privacy of Crowdsourced Applications
3. Differentially Private Mobile Crowdsourcing
4. Trust in Edge-and-fog-based Vehicular Crowdsensing
5. Blockchain-based Solutions for Security and Privacy of MCS Systems
6. MCS Security Games and Incentive Mechanisms
7. Machine Learning Based Privacy/Security Solutions for MCS 135
8. Crowdsourced Mobile Apps
9. Reliable Industrial IoT Using Crowdsourcing
10. Misinformation, Fake News, and Crowdsourcing
11. Security in 6G and Wi-Fi Communications Leveraging Mobile Crowdsensing
12. Problems

Shabnam Sodagari received her Ph.D. from the Pennsylvania State University in electrical engineering and is a faculty member of computer engineering and computer science.