Search Results for handbook-of-big-data-and-iot-security

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and ...

Author: Ali Dehghantanha

Publisher: Springer

ISBN: 9783030105433

Category: Computers

Page: 384

View: 892

DOWNLOAD & READ
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.
2019-03-22 By Ali Dehghantanha

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and ...

Author: Ali Dehghantanha

Publisher:

ISBN: 303010544X

Category: Big data

Page:

View: 693

DOWNLOAD & READ
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.

The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of ...

Author: Kaur, Gurjit

Publisher: IGI Global

ISBN: 9781522574330

Category: Computers

Page: 568

View: 181

DOWNLOAD & READ
The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.
2019-03-29 By Kaur, Gurjit

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field.

Author: Kim-Kwang Raymond Choo

Publisher: Springer Nature

ISBN: 9783030385576

Category: Computers

Page: 397

View: 692

DOWNLOAD & READ
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.
2020-03-18 By Kim-Kwang Raymond Choo

Today, Cloud Computing based services, Big data models and ... security and privacy in heterogeneous IoT, secure and privacy preserving data mining and ...

Author: Gupta, B. B.

Publisher: IGI Global

ISBN: 9781522584087

Category: Computers

Page: 609

View: 500

DOWNLOAD & READ
Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information and communication technology but also all types of systems in society including within the realms of business, finance, industry, manufacturing, and management. Therefore, it is critical to remain up-to-date on the latest advancements and applications, as well as current issues and challenges. The Handbook of Research on Cloud Computing and Big Data Applications in IoT is a pivotal reference source that provides relevant theoretical frameworks and the latest empirical research findings on principles, challenges, and applications of cloud computing, big data, and IoT. While highlighting topics such as fog computing, language interaction, and scheduling algorithms, this publication is ideally designed for software developers, computer engineers, scientists, professionals, academicians, researchers, and students.
2019-04-12 By Gupta, B. B.

Privacy of big data: a review. In Handbook of Big Data and IoT Security, pp. 5–23. Springer, Cham, 2019. [65] A. Nieto, R. Roman, and J. Lopez, ...

Author: Vijayalakshmi Saravanan

Publisher: CRC Press

ISBN: 9781000258516

Category: Technology & Engineering

Page: 170

View: 265

DOWNLOAD & READ
This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader.
2020-12-16 By Vijayalakshmi Saravanan

Table 5.2 demonstrates the Issues in IoT Security and their Solution Mechanism in points of interest. With the broadening scaling down of cell phones, PCs, ...

Author: Vijender Kumar Solanki

Publisher: CRC Press

ISBN: 9780429624490

Category: Computers

Page: 340

View: 517

DOWNLOAD & READ
This multi-contributed handbook focuses on the latest workings of IoT (internet of Things) and Big Data. As the resources are limited, it's the endeavor of the authors to support and bring the information into one resource. The book is divided into 4 sections that covers IoT and technologies, the future of Big Data, algorithms, and case studies showing IoT and Big Data in various fields such as health care, manufacturing and automation. Features Focuses on the latest workings of IoT and Big Data Discusses the emerging role of technologies and the fast-growing market of Big Data Covers the movement toward automation with hardware, software, and sensors, and trying to save on energy resources Offers the latest technology on IoT Presents the future horizons on Big Data
2019-03-08 By Vijender Kumar Solanki

This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics.

Author: Kim-Kwang Raymond Choo

Publisher: Springer

ISBN: 3030747522

Category: Computers

Page: 490

View: 783

DOWNLOAD & READ
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud’s log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS’s cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS’s cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.
2021-11-22 By Kim-Kwang Raymond Choo

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments. ... IoT Calamity: The Panda Monium. ... Handbook of Big Data and IoT Security.

Author: Roshani Raut

Publisher: Engineering Science Reference

ISBN: 9781799875178

Category: Computers

Page: 400

View: 987

DOWNLOAD & READ
"This book provides insights on how deep learning, together with IOT, will impact various sectors such as healthcare, agriculture, cyber security, and social media analysis applications offering solutions to various real-world problems using these methods from various researchers' point of views"--
2021-01-29 By Roshani Raut

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field.

Author: Kim-Kwang Raymond Choo

Publisher: Springer

ISBN: 3030385566

Category: Computers

Page: 516

View: 132

DOWNLOAD & READ
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.
2020-05-17 By Kim-Kwang Raymond Choo

Business Expert Press, LLC, New York (2019) Dehghantanha, A., Choo, K.-K.R. (eds.): Handbook of Big Data and IoT Security. Springer, Cham (2019) Alcaraz, ...

Author: Pradeep Kumar Singh

Publisher: Springer Nature

ISBN: 9783030403058

Category: Technology & Engineering

Page: 716

View: 952

DOWNLOAD & READ
This book explores various challenging problems and applications areas of wireless sensor networks (WSNs), and identifies the current issues and future research challenges. Discussing the latest developments and advances, it covers all aspects of in WSNs, from architecture to protocols design, and from algorithm development to synchronization issues. As such the book is an essential reference resource for undergraduate and postgraduate students as well as scholars and academics working in the field.
2020-02-08 By Pradeep Kumar Singh

Handbook of Big Data and IoT Security. Springer Nature, Cham, Switzerland. Part of Springer Nature. doi:10.1007/978-3-030-10543-3. 15. Zhou, J., Cao, Z., ...

Author: Muhammad Maaz Rehan

Publisher: CRC Press

ISBN: 9781000096163

Category: Computers

Page: 302

View: 773

DOWNLOAD & READ
This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also understand their co-existence and their collaborative power to solve a range of versatile problems. The first part of the book covers fundamental concepts and the applications of blockchain-enabled fog and edge computing. These include: Internet of Things, Tactile Internet, Smart City; and E-challan in the Internet of Vehicles. The second part of the book covers security and privacy related issues of blockchain-enabled fog and edge computing. These include, hardware primitive based Physical Unclonable Functions; Secure Management Systems; security of Edge and Cloud in the presence of blockchain; secure storage in fog using blockchain; and using differential privacy for edge-based Smart Grid over blockchain. This book is written for students, computer scientists, researchers and developers, who wish to work in the domain of blockchain and fog/edge computing. One of the unique features of this book is highlighting the issues, challenges, and future research directions associated with Blockchain-enabled fog and edge computing paradigm. We hope the readers will consider this book a valuable addition in the domain of Blockchain and fog/edge computing.
2020-07-27 By Muhammad Maaz Rehan

Security and Privacy The IoT is easily attacked since 1) its components are usually unattended, 2) its wireless communication system is easily eavesdropped ...

Author: Raj, Pethuru

Publisher: IGI Global

ISBN: 9781466658653

Category: Computers

Page: 570

View: 729

DOWNLOAD & READ
Clouds are being positioned as the next-generation consolidated, centralized, yet federated IT infrastructure for hosting all kinds of IT platforms and for deploying, maintaining, and managing a wider variety of personal, as well as professional applications and services. Handbook of Research on Cloud Infrastructures for Big Data Analytics focuses exclusively on the topic of cloud-sponsored big data analytics for creating flexible and futuristic organizations. This book helps researchers and practitioners, as well as business entrepreneurs, to make informed decisions and consider appropriate action to simplify and streamline the arduous journey towards smarter enterprises.
2014-03-31 By Raj, Pethuru

Online; accessed: April 2017 Azure M. Azure iot protocol gateway. ... Handbook of Big Data and IoT Security. Springer. CHAPTER 7 AUTOMATION MOVIE ...

Author: Dac-Nhuong Le

Publisher: John Wiley & Sons

ISBN: 9781119593201

Category: Computers

Page: 400

View: 698

DOWNLOAD & READ
Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.
2019-10-10 By Dac-Nhuong Le

In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 1687-1704). Dehghantanha, A., & Choo, K. K. R. (Eds.). (2019). Handbook of Big Data and IoT ...

Author: Kumar, Pardeep

Publisher: IGI Global

ISBN: 9781799828051

Category: Computers

Page: 431

View: 631

DOWNLOAD & READ
With the help of artificial intelligence, machine learning, and big data analytics, the internet of things (IoT) is creating partnerships within industry where machines, processes, and humans communicate with one another. As this radically changes traditional industrial operations, this results in the rapid design, cheap manufacture, and effective customization of products. Answering the growing demand of customers and their preferences has become a challenge for such partnerships. Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital is a collection of innovative research that discusses development, implementation, and business impacts of IoT technologies on sustainable societal development and improved life quality. Highlighting a wide range of topics such as green technologies, wireless networks, and IoT policy, this book is ideally designed for technology developers, entrepreneurs, industrialists, programmers, engineers, technicians, researchers, academicians, and students.
2020-05-22 By Kumar, Pardeep

Handbook of Big Data and IoT Security, pp. 73–127. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-10543-3_5 23. Bobba, R., Grov, J., Gupta, I., ...

Author: Xingming Sun

Publisher: Springer Nature

ISBN: 9789811581014

Category:

Page:

View: 728

DOWNLOAD & READ

Challenges, Design Principles, Applications, and Security Ismail Butun ... Dehghantanha, A., Choo, K.-K.R. (eds.): Handbook of big data and IoT security.

Author: Ismail Butun

Publisher: Springer Nature

ISBN: 9783030425005

Category: Computers

Page: 241

View: 716

DOWNLOAD & READ
Proliferation of Internet of Things (IoT) enabled rapid enhancements for the applications not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to the industrial scenarios, applications ranging from remote sensing and actuating to de-centralization and autonomy. In this book, the editor aims at presenting the IIoT and its place during the industrial revolution (Industry 4.0), while they are taking us to a better, sustainable, automated and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, practical use-case scenarios from the industry, for the application of IIoT on smart factories, smart cities and smart grid are presented. Especially, IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as a specific example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented not only to give a better understanding of the enabling technologies, potential advantages and challenges of the Industry 4.0 and IIoT but also to foster interest on exploring this promising area. Finally yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. First, user privacy, data ownership, proprietary information handling related to IIoT networks are investigated. Then, the intrusion prevention, detection and mitigation part conclude the book.
2020-07-01 By Ismail Butun

This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

Author: João Manuel R.S. Tavares

Publisher: CRC Press

ISBN: 9780429887079

Category: Business & Economics

Page: 398

View: 201

DOWNLOAD & READ
There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

Handbook of big data and IoT security. Cham: Springer. Díaz Zayas, A., García Pérez, C. A., Recio Pérez, Á. M., & Merino, P. (2018).

Author: James A. Cunningham

Publisher: Springer Nature

ISBN: 9783030473648

Category: Business & Economics

Page: 144

View: 714

DOWNLOAD & READ
This book focuses on the Internet of Things (IoT). IoT has caught the imagination as a transformational technology that will positively impact a large and diverse array of socio-economic activities. This book explores this impact, beginning with a chapter highlighting the promises and complexities of the IoT. It then explores these in greater detail in subsequent chapters. The first of these chapters explores the patenting activity of leading companies and is followed by a discussion of the challenges faced by the growth of ‘unicorns’ within Europe. The fourth chapter outlines a methodology for determining when investments in IoT should occur and is followed by a discussion of how the data generated by IoT will change marketing related decisions. The scope and complexity of the regulatory and governance structures associated with the IoT are then explored in the sixth chapter. These issues are brought together in the final chapter, which identifies the opportunities and challenges emanating from the IoT and how these may be tackled. This book will be valuable reading to academics working in the field of disruptive technology, innovation management, and technological change more broadly.
2020-07-13 By James A. Cunningham

S. Yousefi, F. Derakhshan, and H. Karimipour, “Applications of big data analytics and machine learning in the internet of things,” in Handbook of Big Data ...

Author: Hadis Karimipour

Publisher: Springer Nature

ISBN: 9783030766139

Category: Computers

Page: 250

View: 740

DOWNLOAD & READ
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data security, privacy and application of blockchain technology in the IIoT environment. This book also examines more advanced and specific topics in AI-based solutions developed for efficient anomaly detection in IIoT environments. Different AI/ML techniques including deep representation learning, Snapshot Ensemble Deep Neural Network (SEDNN), federated learning and multi-stage learning are discussed and analysed as well. Researchers and professionals working in computer security with an emphasis on the scientific foundations and engineering techniques for securing IIoT systems and their underlying computing and communicating systems will find this book useful as a reference. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, cyber security, and information systems. It also applies to advanced-level students studying electrical engineering and system engineering, who would benefit from the case studies.
2021-08-03 By Hadis Karimipour

Best Books