Kavita Sharma & Vishnu Sharma 
Securing the Digital Frontier [PDF ebook] 
Threats and Advanced Techniques in Security and Forensics

Supporto

Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats with insights from leading experts and real-world case studies.

In the field of security and forensics, it’s crucial to implement strong security measures to protect sensitive data and effectively respond to cyber incidents. Digital forensics is vital for analyzing cyber threats, where experts use advanced techniques to scrutinize digital artifacts, system logs, and network traffic. This approach helps reconstruct incidents, pinpoint vulnerabilities, and support legal actions, ensuring the confidentiality, integrity, and availability of crucial data in our rapidly evolving digital world.

This book provides an in-depth look at security and forensics, pooling knowledge from top experts across various cybersecurity domains. It focuses on real-world applications and case studies, offering valuable insights for protecting information and responding to digital crimes. Designed for cybersecurity professionals, digital forensics investigators, legal teams, and academics, this comprehensive guide is a key resource for anyone looking to deepen their understanding of modern digital forensics and cybersecurity challenges.

€188.99
Modalità di pagamento

Tabella dei contenuti

Preface xix

1 Pegasus—A Menace to Privacy and Security 1
Raunaq Khurana and Shilpa Mahajan

1.1 Introduction 1

1.2 Working of Pegasus 4

1.2.1 Pegasus Attacking i OS 8

1.2.2 Pegasus Impacting Android 9

1.2.3 Differentiating Android and i OS Pegasus 10

1.3 Literature Review 10

1.4 Methodologies 12

1.5 Pegasus Implantation Techniques 12

1.6 Mitigation Measures 13

1.7 Conclusion 14

References 14

2 Data Privacy and Compliance in Information Security 17
Rakesh Nayak, Umashankar Ghugar, Praveen Gupta, Satyabrata Dash and Nishu Gupta

2.1 Introduction 18

2.2 Discussion on Risks, Consequences, and Security Measures for Data Privacy 19

2.2.1 Getting Around the Compliance Landscape in Information Security 22

2.2.2 Legal Frameworks: Protecting Privacy Rights, CCPA, and GDPR 23

2.2.2.1 General Data Protection Regulation (GDPR) 23

2.2.2.2 California Consumer Privacy Act (CCPA) 24

2.2.3 Challenges in Achieving Compliance and the Repercussions of Noncompliance 24

2.2.4 Principles to Follow to Ensure Data Privacy and Compliance 26

2.2.5 Integrated Approach: Audits, Access Controls, Encryption, and Privacy Awareness 27

2.3 Data Privacy and Compliance in Information Security: The Changing Nature 28

2.4 Continuous Learning and Adaptation: Keeping Pace with Emerging Technologies and Regulations 31

2.5 Conclusion 32

References 33

3 Unveiling Cyber Threats and Digital Forensics 35
Nidhi Gupta, Arpita Trivedi, Parveen P. Terang and Hasmat Malik

3.1 Information Security 36

3.1.1 Issues and Challenges 36

3.1.2 Digital Forensics 37

3.2 Cyberattacks 39

3.2.1 System Exploitation 39

3.2.2 Phishing 40

3.2.3 Man in the Middle Attack 41

3.2.4 Denial of Service 42

3.2.5 Ransomware 43

3.3 Protection Techniques 44

3.3.1 Firewalls 45

3.3.2 Threat Modeling 46

3.3.3 Penetration Testing 48

3.3.4 Encryption 50

3.3.5 Access Control 52

3.4 Internet of Medical Things 53

3.5 Conclusion 54

References 54

4 A Customised Privacy Preservation Mechanism for Cyber-Physical Systems 59
Manas Kumar Yogi and A.S.N. Chakravarthy

4.1 Introduction 59

4.1.1 Role of CPS 60

4.1.2 Privacy Preservation in CPS 61

4.1.3 Motivation for CPS Privacy 62

4.2 Background 64

4.2.1 Current Trends in CPS Privacy 64

4.2.2 Trade-Off Between Privacy and Data Utility 65

4.2.3 Challenges in Variable Differential Privacy Implementation 66

4.3 Motivation 73

4.3.1 Variants of Differential Privacy 73

4.3.2 Impact of Noise Addition in Variants of Differential Privacy 74

4.4 Proposed Mechanism 76

4.4.1 Algorithm: Customized Differential Privacy 78

4.4.2 Algorithm: Privacy-Utility Balancing in Differential Privacy 80

4.5 Experimental Results 81

4.5.1 Interpretations of the Results 82

4.5.2 The Advantages of Using Customized Privacy Budgets are Evident in the Following Ways 84

4.6 Future Directions 84

4.7 Conclusion 88

References 88

5 Securing the Future: Emerging Threats and Countermeasures in Cryptography 91
Debosree Ghosh, Kishore Ghosh, Chandrima Chakraborty, Atanu Datta and Somsubhra Gupta

5.1 Introduction 92

5.2 Quantum Computing and Post-Quantum Cryptography 92

5.3 Cryptanalysis: Cracking the Code 93

5.4 Side-Channel Attacks: Stealthy and Insidious 95

5.5 Fault Attacks: Exploiting Implementation Weaknesses 96

5.5.1 Permanent Fault Attacks 97

5.5.2 Transient Fault Attacks 97

5.6 Hardware Security Modules (HSMS) 97

5.6.1 HSMs Offer a Range of Features that Make Them a Critical Component of Modern Information Security Systems 98

5.6.2 HSMs Applications in Various Industries and Scenarios 99

5.7 Secure Implementations: From Theory to Reality 99

5.8 A Holistic Approach to Cryptography 99

5.9 Quantum Key Distribution (QKD) 100

5.10 Internet of Things in Cryptography 102

5.11 Artificial Intelligence in Cryptography 103

5.12 Cryptarithmetic 104

5.13 The Road Ahead: Future Trends and Prospects 105

5.14 Conclusion 106

Bibliography 106

6 Cyber Threats and Its Impact on Electronic Transactions 109
Ramalingam Dharmalingam and Vaishnavi Dharmalingam

6.1 Introduction 109

6.2 Digital Transformation and Cybersecurity 111

6.3 Evolution of Cyber Threats 112

6.3.1 Telephone Hacks in the 1950s 113

6.3.2 Introduction of Computer Virus in the 1970s and 1980s 113

6.3.3 Widespread Malware Attacks in the 1990s 114

6.3.4 The Turn of the Century 114

6.3.5 Threat to the Connected “Things” in the 2020s 115

6.4 Emerging Cyber Threats 115

6.4.1 Malware Delivery 116

6.4.2 Fileless Malware 119

6.4.3 Legitimate Service Abuse 119

6.4.4 Botnet Renovations 119

6.4.5 Search Engine Optimization and Malicious Advertising 120

6.4.6 Security Tools as a Malware 120

6.4.7 Web Shells Deep Dive 121

6.4.8 Domain-Generating Algorithms 121

6.4.9 AI-Enabled Cyber Attacks 121

6.5 Impacts of Data Breaches in the Financial Sector 121

6.6 Cybersecurity Standards, Frameworks, and Benchmarks 124

6.7 Innovative Approaches to Cyber-Incident Management 127

6.7.1 International and Multistakeholder Collaboration 127

6.7.2 Cognitive Analytics in Cybersecurity Management 128

6.7.3 Security Automation for Combating Cyberattacks 128

6.8 Conclusion 129

References 129

7 A Robust Model for Enabling Insider Threat Detection and Prevention: Techniques, Tools, and Applications 133
A. Sheik Abdullah, Shivansh Dhiman and Arif Ansari

7.1 Introduction 134

7.2 Structure 135

7.3 Impact of Insider Threats on Modern Organizations 137

7.3.1 Types of Insider Threats 137

7.3.2 Importance of Understanding the Impact of Insider Threats 139

7.3.3 The Magnitude of the Threat 140

7.3.4 Why are Insider Threats so Dangerous? 141

7.5 Challenges in Insider Threat Detection 142

7.6 Techniques for Insider Threat Detection 144

7.7 Robust Model 146

7.7.1 Shortcomings in Current Insider Threat Detection Models 147

7.7.2 Required Algorithms and Tools for Robust Model 148

7.7.2.1 Supervised Learning Model 149

7.7.2.2 Complex Event Processing 150

7.7.3 Integration Model 152

7.7.4 Pseudocode 154

7.8 Application and Case Studies 156

7.8.1 Introduction 156

7.8.2 How the Integration Works 156

7.8.3 Case Studies 157

7.9 Other Important Insider Threat Prevention Strategies 158

7.10 Ethical Considerations 160

7.11 Future Trends 163

7.12 Conclusion 165

References 166

Authored Book 167

References 167

8 Digital Vulnerabilities Unveiled: A Multidisciplinary Exploration of Emerging Threats to Security and Privacy in the Age of Networked Communication 169
Priya Sachdeva and Archan Mitra

8.1 Introduction 170

8.1.1 Objectives 171

8.2 Theoretical Foundation 172

8.2.1 Conceptual Foundations 172

8.2.2 The Literary Nexus 173

8.3 Methodological Framework 174

8.3.1 Data Collection 174

8.3.2 Data Analysis 175

8.3.3 Integration of Multidisciplinary Perspectives 175

8.3.4 Ethical Considerations 175

8.4 Emergent Themes 176

8.4.1 Misinformation and Fake News 176

8.4.2 Data Breaches Put Personal Information at Risk 176

8.4.3 The Role of Humans in Phishing and other Forms of Social Engineering 177

8.5 Interdisciplinary Insights 178

8.5.1 Connecting Threads 178

8.5.2 Dialogue Across Disciplines 178

8.6 Pedagogical Implications 179

8.6.1 The Development of Curriculum 179

8.6.2 Education that Promotes Ethical and Effective Communication 180

8.7 Findings and Discussion 181

8.7.1 Survey Findings 181

8.7.2 Findings from the Interview 181

8.7.3 Discussion 182

8.8 Integration and Synthesis 185

8.8.1 Bringing Together Multidisciplinary Perspectives 185

8.8.2 Policy and Practice Recommendations 186

8.9 Conclusion 187

References 188

Appendix A: Survey Instrument 190

9 Tools of Emancipation as Global Web and its Digital Ecosystem: Steering Io T Landscape, Cloud Computing Unravel Safe Spaces Lensing New Cyber Risks and Emerging Threats 197
Bhupinder Singh and Christian Kaunert

9.1 Introduction 198

9.1.1 Background of Study 199

9.1.2 Objectives 200

9.1.3 Scope of the Study 200

9.1.4 Structure of the Chapter 201

9.2 Tools of Emancipation on the World Wide Web: Conceptual Framework and Definition 202

9.2.1 Historical Evolution 202

9.2.2 Contemporary Significance 203

9.3 Io T Landscape and Its Overview: Opportunities and Challenges 203

9.4 Cloud Computing: Pillar for Safe Spaces Protection 204

9.4.1 Fundamental Concepts of Cloud Computing 205

9.4.2 Security Aspects of Cloud Services 206

9.4.3 Cloud-Based Solutions for Safe Spaces 206

9.5 Cyber Risks and Emerging Threats—Current Landscape of Cyber Threats 206

9.6 Tools of Emancipation: Digital Tools for Positive Purposes and Potential for Using Technology 207

9.7 Assimilating Tools of Emancipation, Cloud Computing, and Io T 208

9.8 Embryonic Updated Technologies and Future Tendencies 209

9.9 New Cyber Risks and Emerging Threats 210

9.9.1 Policy Implications, Societal and Ethical Considerations Concerning Safe Spaces Lensing New Cyber Risks and Emerging Threats 211

9.10 Conclusion and Future Scope 212

References 213

10 Io T and Smart Device Security: Emerging Threats and Countermeasures 217
Geo Francis E., S. Sheeja, Antony John E.F. and Jismy Joseph

10.1 Introduction to Io T and Smart Devices 217

10.1.1 Definition and Scope 220

10.1.2 Growth and Importance of Io T 221

10.1.3 Smart Device Landscape 222

10.2 Vulnerabilities in Io T Devices 223

10.2.1 Insecure Device Design and Configuration 224

10.2.2 Weak Authentication and Authorization 224

10.2.3 Lack of Device Updates and Patch Management 225

10.3 Emerging Threats in Io T Security 226

10.3.1 Botnets and DDo S Attacks 226

10.3.2 Data Breaches and Privacy Risks 226

10.3.3 Physical Damage and Safety Concerns 227

10.4 Attack Vectors in Io T 228

10.4.1 Network Exploitation 228

10.4.2 Firmware and Software Exploits 229

10.4.3 Social Engineering and Phishing 229

10.5 Countermeasures for Io T Security 230

10.5.1 Secure Device Design Principles 230

10.5.2 Authentication and Encryption 231

10.5.3 Network Segmentation and Monitoring 231

10.5.4 Security Updates and Patch Management 232

10.6 Case Studies in Io T Security 232

10.6.1 Notable Io T Security Incidents 233

10.6.2 Successful Io T Security Implementations 234

10.7 Future Trends and Challenges in Io T Security 236

10.7.1 Artificial Intelligence and Machine Learning in Io T Security 236

10.7.2 Regulatory and Legal Considerations 236

10.7.3 Securing Emerging Io T Technologies 237

10.8 Conclusion 238

10.8.1 Recap of Key Points 238

10.8.2 Importance of Io T Security Implementation 239

10.8.3 Future Outlook for Io T Security 239

References 240

11 Secured Io T with LWC and Blockchain 243
Srishti Priya Chaturvedi, Ajay Yadav, Santosh Kumar and Rahul Mukherjee

11.1 Introduction 244

11.1.1 Io T Architecture 247

11.1.1.1 Three-Layered Io T Architecture 247

11.1.1.2 Five-Layered Io T Architecture 248

11.1.1.3 Cloud and Fog/Edge-Based Io T Architecture 249

11.2 Applications of Io T 251

11.2.1 Smart Home 251

11.2.2 Smart Healthcare 252

11.2.3 Industrial Io T 252

11.2.4 Smart Agriculture 252

11.2.5 Smart Mobility 252

11.2.6 Smart Grid 253

11.2.7 Environment Monitoring 253

11.3 Different Security Attacks on Io T Layers 254

11.3.1 Active Attack 254

11.3.1.1 Security Attacks on Perception/ Physical Layer 255

11.3.1.2 Security Attacks on Network Layer 256

11.3.1.3 Security Attacks on Processing Layer 257

11.3.1.4 Security Attacks on Application Layer 257

11.3.1.5 Security Attacks on Business Layer 258

11.3.2 Passive Attack 259

11.3.2.1 Eavesdropping 259

11.3.2.2 Traffic Analysis 259

11.4 Solution to Io T Security Attacks 259

11.4.1 Io T Security Using Blockchain Technology 259

11.4.1.1 Network Layer 260

11.4.1.2 Consensus Layer 260

11.4.1.3 Data Layer 260

11.4.1.4 Execution Layer 261

11.4.1.5 Application Layer 261

11.4.2 Blockchain-Based Io T Applications 261

11.4.2.1 Cyber-Physical Systems 262

11.4.2.2 Intelligent Transportation System 262

11.4.2.3 Smart City 262

11.4.2.4 Supply Chain Management 262

11.4.2.5 Underwater Things 262

11.4.3 Io T Security Using Lightweight Cryptography 262

11.4.3.1 Lightweight Cryptography 264

11.5 Conclusion 265

References 266

12 Social Engineering Attacks: Detection and Prevention 269
Rajat Singh, Priyanka Soni and Animaw Kerie

12.1 Introduction 269

12.1.1 Strong Affect 270

12.1.2 Overloading 271

12.1.3 Reciprocation 271

12.1.4 Deceptive Relationship 271

12.1.5 Diffusion of Moral Duty and Responsibility 271

12.1.6 Authority 271

12.1.7 Consistency and Commitment 272

12.2 Life Cycle of Social Engineering 272

12.2.1 Selection of Target and Reconnaissance 272

12.2.2 Planning and Preparation 273

12.2.3 Initiation of Contact 273

12.2.4 Fostering Trust and Manipulation 273

12.2.5 Elicitation and Exploitation 273

12.2.6 Launch of Attack 273

12.2.7 Maintaining the Access 274

12.2.8 Covering the Trails 274

12.3 Types of Social Engineering 274

12.3.1 Phishing 275

12.3.2 Vishing 275

12.3.3 Grooming 275

12.3.4 Identity Theft 275

12.3.5 Quid Pro Quo Attacks 276

12.3.6 Dumpster Diving Attacks 276

12.3.7 Diversion Theft Attacks 276

12.3.8 Tailgating 276

12.3.9 File Masquerade 277

12.3.10 Water-Holing 277

12.4 Social Engineering Attacks Using Advanced Techniques 277

12.5 Social Engineering Attack Detection Models 278

12.5.1 Seadm 278

12.5.2 SEADMv 2 279

12.5.3 SEADer 280

12.5.4 SEADer++ V 2 281

12.6 Detection of Social Engineering Links 281

12.7 Preventive Approaches 282

12.7.1 Siem 282

12.7.2 Next-Gen Cloud-Based WAF 283

12.7.3 “Human-as-a-Security-Sensor Framework” 283

12.7.4 Awareness Programs 284

12.7.5 Prevention Protocols 284

12.8 Preventive Measures Against Social Engineering Attacks 285

12.8.1 Avoid Clicking Unknown Links 285

12.8.2 Use Multi-Factor Authentication 286

12.8.3 Verify Email Sender’s Identity 286

12.8.4 Check for SSL Certificate 286

12.8.5 Check for Updates 286

12.8.6 Pay Attention to Your Digital Footprint 286

12.9 Conclusion 286

References 287

13 Multilayer Perceptron of Occlusion and Pose-Sensitive Ear Attributes for Social Engineering Attack Mitigation 291
O. Taiwo Olaleye, Oluwasefunmi Arogundade, Adebayo Abayomi-Alli, Wilson Ahiara, Temitope Ogunbiyi, Segun Akintunde, Segun Dada and Olalekan Okewale

13.1 Introduction 292

13.1.1 Biometric Authentication and Social Engineering Attacks 293

13.1.1.1 Strengths of Biometric Authentication 293

13.1.1.2 Weaknesses of Biometric Authentication 293

13.2 Literature Review 295

13.2.1 Black Ear Inclusivity in Biometric Authentication Systems 296

13.3 Materials and Methods 299

13.3.1 Data Acquisition 299

13.3.2 Feature Extraction 299

13.3.2.1 Color Layout Filter 299

13.3.2.2 Edge Histogram Filter 300

13.3.3 One-Hot Encoding 301

13.3.4 Predictive Analytics by the Perceptron 303

13.3.5 Parameter Optimization of MLP 303

13.4 Result and Discussion 305

13.4.1 Performance Metrics of MLP on Occlusion and Pose Sensitive Ear Facial Dataset 305

13.4.2 Performance Metrics of MLP on Occlusion and Pose Sensitive Ear Facial Dataset After One-Hot Encoding 306

13.4.3 Performance Metrics of MLP on Occlusion and Pose Sensitive Ear Facial Dataset with Parameter Optimization 307

13.4.4 Performance Metrics of MLP on Occlusion and Pose Sensitive Ear Facial Dataset After One-Hot Encoding with Parameter Optimization 308

13.4.5 Overall Evaluation of MLP on the Experimental Measures 309

13.5 Conclusion 311

References 312

14 Study and Analysis of Cyberbullying Message Detection and Prevention Using Machine Learning Techniques 315
S. Shanmugam, S. Gunasekaran and N. Anusha

14.1 Introduction 316

14.2 Literature Survey 318

14.2.1 Identifying Cyberbullies Through Twitter Data Analysis 318

14.2.2 Cyber Bullying Detection on Social Media Using Machine Learning 318

14.2.3 Cyberbullying in Schools: A Research of Gender Differences 319

14.2.4 Automated Detection of Cyberbullying Using Machine Learning 319

14.3 Implementation of Cyberbullying Model 320

14.3.1 Dataset Description 320

14.3.2 Architecture and Functionalities of the Proposed System 321

14.3.2.1 NLP Toolkit for Implementation 322

14.3.3 Performance Evaluation Measures 324

14.4 Evaluation and Comparison of Machine Learning Techniques for Cyber Bullying 325

14.5 Conclusion 329

References 329

15 Future Directions in Digital Forensics and Cybersecurity 333
Elipe Arjun and Priyanka Singh

15.1 Overview of Digital Forensics and Cyber Forensics 333

15.2 Introduction 335

15.2.1 Rapid Technological Evolution 337

15.2.2 An Ever-Changing Threat Landscape 337

15.3 Technologies and Their Impact 337

15.3.1 Balancing Opportunity and Threat 337

15.4 Impact of Emerging Technologies on Digital Forensics and Cybersecurity 338

15.4.1 Artificial Intelligence (AI) and Machine Learning (ML) 338

15.4.2 Quantum Computing 340

15.4.3 5G Technology 340

15.4.4 Blockchain Technology 340

15.4.5 Biometric Technologies 340

15.4.6 Cloud Computing 341

15.4.7 Io T (Internet of Things) 341

15.4.8 Automated Threats and Botnets 342

15.4.9 Augmented Reality (AR) Virtual Reality (VR) and Autonomous Systems and AI-Driven Attacks 342

15.5 Cybersecurity and Digital Forensics: Threats and Opportunities 342

15.5.1 Threats 343

15.5.2 Opportunities 344

15.6 Future of Digital Forensics 346

15.6.1 Emerging Trends and Future Directions in Digital Forensics 347

15.6.2 Potential Benefits and Challenges of These Emerging Trends of Digital Forensics 348

15.6.3 Significant Challenges in Modern Digital Forensics, Both from an Ethical and Technological Perspective 349

15.7 The Future of Cybersecurity 350

15.7.1 Overview of Future Directions and Emerging Trends in Cybersecurity 350

15.7.2 Emerging Trends and Potential Benefits Include 351

15.7.3 Challenges in Cybersecurity 352

15.8 Collaboration and Interdisciplinary Approaches 353

15.8.1 Ways in Which Digital Forensics and Cyber Security Might Collaborate 353

15.9 Ethics and Human Factors in Future Digital Forensics and Cybersecurity 356

15.9.1 Why Do we Need Ethics in Technology? 356

15.9.2 What Does Ethics Have to Do with Cybersecurity and Digital Forensics? 357

15.9.3 Potential Benefits 358

15.10 Challenges and Opportunities of Digital and Cyber-Forensics 359

15.10.1 Challenges 359

15.10.2 Opportunities 360

15.11 Conclusion 360

15.11.1 Summary of Key Points 361

15.11.2 Discussion of Importance 361

15.11.3 Conclusion and Implications for Future Research and Practice 362

References 363

16 Tomorrow’s Shields: Exploring Future Trends in Cyber Security and Forensics 367
Mridu Sharma, Ravshish Kaur Kohli and Kunal Sharma

16.1 Introduction 368

16.2 Recent Digital Forensic Trends 369

16.2.1 Cloud Forensics 369

16.2.2 Social Media Forensics 370

16.2.3 Io T Forensics 372

16.3 Threats Faced by Digital Forensics 374

16.3.1 Technical Challenges 374

16.3.2 Operational Challenges 375

16.3.3 Personnel-Related Challenges 376

16.4 Opportunities 378

16.4.1 USB Forensics 378

16.4.2 Intrusion Detection 379

16.4.3 Artificial Intelligence 380

16.5 Conclusion 382

References 382

Index 387

Circa l’autore

Kavita Sharma, Ph D, is a professor in the Department of Computer Science and Engineering at Galgotias College of Engineering and Technology, Greater Noida, India with over 12 years of research and academic experience. She has also been awarded a research fellowship from the Ministry of Electronics and Information Technology from the Government of India. Additionally, she has four patents (one granted and three published) and one granted design and has published seven books and 45 research articles in international journals and conferences of high repute.
Vishnu Sharma, Ph D, is the Head of Department and a professor in the Department of Computer Science and Engineering at Galgotias College of Engineering and Technology, Greater Noida, India with over 21 years of teaching experience. He has published over 50 research papers on mobile ad-hoc networks and mobile computing in national and international conferences and journals, as well as two books on mobile computing and advanced mobile computing. Additionally, he has organized several national and international conferences and workshops and serves as the editor of IEEE Conference ICCCA proceedings.
Parma Nand, Ph D, is the Dean of Academics at Sharda University, Greater Noida, India. He has over 26 years of teaching, industry, and research experience, emphasizing bridging the gap between academics and industry keeping in mind the growing IT industry in terms of futuristic technologies. Through his work, he has provided consultancy on a number of projects for industries and has delivered many invited and keynote talks at national and international conferences, workshops, and seminars in India and abroad. He has published more than 85 papers in peer-reviewed national and international journals and conferences, as well as two filed patents.
Anil Kumar Sagar, Ph D, is a professor in the Department of Computer Science and Engineering in the School of Engineering and Technology, Sharda University, India with over 20 years of experience in teaching, guiding ten Master’s of Technology and five doctoral candidates in computer science. He also serves as a member of the editorial boards and review committees for many national and international journals and has served as a program and organizing committee member for several conferences.
Gulshan Shrivastava, Ph D, is an associate professor in the Department of Computer Science and Engineering at Galgotias University, Greater Noida, India. He has five patents (four granted, one published) and 55 articles, books, and editorials in international journals and conferences of high repute. He also serves many reputed journals as a guest editor, editorial board member, international advisory board member, and reviewer board member and has delivered expert talks and guest lectures at numerous international conferences.

Acquista questo ebook e ricevine 1 in più GRATIS!
Lingua Inglese ● Formato PDF ● Pagine 417 ● ISBN 9781394268900 ● Dimensione 19.5 MB ● Editore Kavita Sharma & Vishnu Sharma ● Casa editrice Wiley-Scrivener ● Paese US ● Pubblicato 2025 ● Edizione 1 ● Scaricabile 24 mesi ● Moneta EUR ● ID 10200278 ● Protezione dalla copia Adobe DRM
Richiede un lettore di ebook compatibile con DRM

Altri ebook dello stesso autore / Editore

16.743 Ebook in questa categoria