Abstract
The mobile crowdsourcing network (MCN) is a rising network architecture that comprises both crowdsensing and crowdsourcing computing. It has attracted broad attention in the world because of its powerful ability to deal with increasingly hard problems. Compared to traditional network, it is more vulnerable to be attacked for its generous payment. At the same time, an amount of input data which comes from various sources is delivered among the service providers, end users and participants, and the involved sensitive information may be revealed during the transmission. Moreover, as the characteristics of MCNs, including task crowdsourcing, human involvement, dynamic topology and heterogeneity, both security and privacy issues are more challenging. In this chapter, we review the current MCN architecture and new challenges of security and privacy issues at first. Then, we present some proposed approaches for security assurance and privacy protection in MCNs from three aspects: authentication, reputation and incentive mechanisms. Finally, possible research directions of security and privacy issues in MCNs and plenty of related reference are given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M.-C. Yuen, I. King, and K.-S. Leung. (2012). A survey of crowdsourcing systems. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference, pp. 766–773. Boston, MA, USA.
K. Yang, K. Zhang, J. Ren, and X. Shen. (2015). Security and privacy in mobile crowdsourcing networks: challenges and opportunities. IEEE Communications Magazine, vol. 53, pp. 75–81.
P. Jollivet. (2011). Crowdsourced security, trust & cooperation for learning digital megacities: valuing social intangible assets for competitive advantage and harmonious development. In Smart and Sustainable City (ICSSC 2011), IET International Conference, pp. 1–4. Shanghai, China.
Y. Wang, Y. Huang, and C. Louis. (2013). Towards a framework for privacy-aware mobile crowdsourcing. In Social Computing (SocialCom), 2013 International Conference, pp. 454–459. Alexandria, VA, USA.
H. Kajino, H. Arai, and H. Kashima. (2014). Preserving worker privacy in crowdsourcing. Data Min Knowl Disc, vol. 28, no. 5C6, pp. 1314–1335.
T. Kandappu, A. Friedman, V. Sivaraman, and R. Boreli. (2015). Privacy in crowdsourced platforms. In Privacy in a Digital, Networked World, S. Zeadally and M. Badra, Eds. Springer International Publishing, pp. 57–84.
B. Zhang, C. H. Liu, J. Lu, Z. Song, Z. Ren, J. Ma, and W. Wang. (2016). Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Computer Networks, pp. 29–41.
S. Vaya. (2012). Robust reputation mechanisms for achieving fair compensation and quality assurance in crowdcomputing. In Social Informatics (SocialInformatics), 2012 International Conference, pp. 228–235. Lausanne, Switzerland.
J. Chang, P. Gebhard, A. Haeberlen, Z. Ives, I. Lee, O. Sokolsky, et al.(2013). TrustForge: Flexible access control for collaborative crowd-sourced environment. In Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference, pp. 291–300. Tarragona, Spain.
N. Nguyen. (2014). Microworkers crowdsourcing approach, challenges and solutions. In Proceedings of the 2014 International ACM Workshop on Crowdsourcing for Multimedia, pp. 1–1. Tarragona, Spain.
W. S. Lasecki, J. Teevan, and E. Kamar. (2014). Information extraction and manipulation threats in crowd-powered systems. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, pp. 248–256. Baltimore, Maryland, USA.
X. Shen. (2015). Mobile crowdsourcing [Editor’s note]. IEEE Network, vol. 29, pp. 2–3.
L. Cilliers and S. Flowerday.(2014). Information security in a public safety, participatory crowdsourcing smart city project. In Internet Security (WorldCIS), 2014 World Congress, pp. 36–41. London, UK.
N. Haderer, V. Primault, P. Raveneau, C. Ribeiro, R. Rouvoy, and S. Ben Mokhtar. (2014). Towards a Practical Deployment of Privacy-preserving Crowd-sensing Tasks. In Proceedings of the Posters & Demos Session, pp. 43–44, New York, NY, USA.
R. K. Ganti, F. Ye, and H. Lei. (2011). Mobile crowdsensing: current state and future challenges. IEEE Communications Magazine, vol. 49, pp. 32–39.
L. Zhang, X. Lu, P. Xiong, and T. Zhu. (2015). A differentially private method for reward-based spatial crowdsourcing. In Applications and Techniques in Information Security, ed: Springer, 2015, pp. 153–164.
J. Hu, L. Huang, L. Li, M. Qi, and W. Yang. (2015). Protecting location privacy in spatial crowdsourcing. In Web Technologies and Applications, R. Cai, K. Chen, L. Hong, X. Yang, R. Zhang, and L. Zou, Eds. Springer International Publishing, pp. 113–124.
P. Cheng, X. Lian, Z. Chen, R. Fu, L. Chen, J. Han, et al. (2015). Reliable diversity-based spatial crowdsourcing by moving workers. Proceedings of the VLDB Endowment, vol. 8, pp. 1022–1033.
M. Hosseini, K. Phalp, J. Taylor, and R. Ali.(2014). The four pillars of crowdsourcing: A reference model. In Research Challenges in Information Science (RCIS), 2014 IEEE Eighth International Conference, pp. 1–12. Marrakech, Morocco.
H. To, L. Fan, L. Tran, and C. Shahabi. (2016). Real-time task assignment in hyper-local spatial crowdsourcing under budget constraints. Pervasive Computing and Communications (PerCom), 2016 IEEE International Conference, pp. 1–8. Sydney, NSW, Australia.
F. Fuchs-Kittowski, S. Simroth, S. Himberger, and F. Fischer. (2012). A content platform for smartphone-based mobile augmented reality. in EnviroInfo, pp. 403–411.
U. Meissen, D. Faust, and F. Fuchs-Kittowski. (2013). WIND-A meteorological early warning system and its extensions towards mobile services. in EnviroInfo, pp. 612–621.
A. Thiagarajan, L. Ravindranath, K. LaCurts, S. Madden, H. Balakrishnan, S. Toledo, et al. (2009). VTrack: accurate, energy-aware road traffic delay estimation using mobile phones. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, pp. 85–98. New York, NY, USA.
C. Laoudias, G. Constantinou, M. Constantinides, S. Nicolaou, D. Zeinalipour-Yazti, and C. G. Panayiotou. (2012). The airplace indoor positioning platform for android smartphones. In Mobile Data Management (MDM), 2012 IEEE 13th International Conference, pp. 312–315. Bengaluru, Karnataka, India.
E. Aubry, T. Silverston, A. Lahmadi, and O. Festor. (2014). CrowdOut: a mobile crowdsourcing service for road safety in digital cities. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference, pp. 86–91. Budapest, Hungary.
C. Xu, S. Li, Y. Zhang, E. Miluzzo, and Y.-F. Chen. (2014). Crowdsensing the speaker count in the wild: implications and applications. IEEE Communications Magazine, vol. 52, pp. 92–99.
H. M. V. Go, J. C. B. Pabico, J. D. Caro, and M. L. Tee. (2015). Crowdsourcing for healthcare resource allocation. In Information, Intelligence, Systems and Applications (IISA), 2015 6th International Conference, pp. 1–6. Corfu, Greece.
J. P. Bigham, C. Jayant, H. Ji, G. Little, A. Miller, R. C. Miller, et al. (2010). VizWiz: nearly real-time answers to visual questions. In Proceedings of the 23nd annual ACM symposium on User interface software and technology, pp. 333–342. New York, NY, USA.
W. S. Lasecki, P. Thiha, Y. Zhong, E. Brady, and J. P. Bigham. (2013). Answering visual questions with conversational crowd assistants. In Proceedings of the 15th International ACM SIGACCESS Conference on Computers and Accessibility, p. 18. Bellevue, Washington.
W. Lasecki, C. Miller, A. Sadilek, A. Abumoussa, D. Borrello, R. Kushalnagar, et al. (2012). Real-time captioning by groups of non-experts. In Proceedings of the 25th annual ACM symposium on User interface software and technology, pp. 23–34. Cambridge, Massachusetts, USA.
M.-C. Yuen, I. King, and K.-S. Leung. (2011). A survey of crowdsourcing systems. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference, pp. 766–773. Boston, MA, USA.
W. S. Lasecki, Y. C. Song, H. Kautz, and J. P. Bigham. (2013). Real-time crowd labeling for deployable activity recognition. In Proceedings of the 2013 conference on Computer supported cooperative work, pp. 1203–1212. San Antonio, Texas, USA.
J. Deng, J. Krause, and L. Fei-Fei. (2013). Fine-grained crowdsourcing for fine-grained recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 580–587. Portland, OR, USA.
O. F. Zaidan and C. Callison-Burch. (2011). Crowdsourcing translation: Professional quality from non-professionals. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 1220–1229. Stroudsburg, PA, USA.
X. Chen, P. N. Bennett, K. Collins-Thompson, and E. Horvitz. (2013). Pairwise ranking aggregation in a crowdsourced setting. In Proceedings of the sixth ACM international conference on Web search and data mining, pp. 193–202. Rome, Italy.
L. R. Varshney. (2012). Privacy and reliability in crowdsourcing service delivery. In SRII Global Conference (SRII), 2012 Annual, pp. 55–60. San Jose, CA, USA.
H. Kajino, H. Arai, and H. Kashima. (2014). Preserving worker privacy in crowdsourcing. Data Mining and Knowledge Discovery, vol. 28, pp. 1314–1335.
A. Xu, X. Feng, and Y. Tian. (2015). Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A. In Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 2533–2541. Kowloon, Hong Kong.
ZhuBaJie.com. Available: http://www.zhubajie.com/
D.-k. Kim, M. Motoyama, G. M. Voelker, and L. K. Saul. (2011). Topic modeling of freelance job postings to monitor web service abuse. In Proceedings of the 4th ACM workshop on Security and artificial intelligence, pp. 11–20. Chicago, Illinois, USA.
C. Fu, Z. Shaobin, S. Guangjun, and G. Mengyuan. (2014). Crowdsourcing leakage of personally identifiable information via sina Microblog. In Internet of VehiclesCTechnologies and Services, ed: Springer, 2014, pp. 262–271.
I. Ben Amor, M. Ouziri, S. Sahri, and N. Karam. (2014). Be a collaborator and a competitor in crowdsourcing system. In Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2014 IEEE 22nd International Symposium on, pp. 158–167. Paris, France.
R. W. Ouyang, M. Srivastava, A. Toniolo, and T. J. Norman. (2014). Truth discovery in crowdsourced detection of spatial events. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp. 461–470. Shanghai, China.
K. Ahmed, S. Ren, V. Turnewitsch, and A. V. Vasilakos. (2013). Credibility optimization and power control for secure mobile crowdsourcing. In Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference, pp. 1501–1508. Monticello, IL, USA.
L. P. Cox. (2011). Truth in crowdsourcing. Security & Privacy, IEEE, vol. 9, pp. 74–76.
C. G. Harris and P. Srinivasan. (2013). Crowdsourcing and ethics. In Security and Privacy in Social Networks, ed: Springer, 2013, pp. 67–83.
A. Basu, J. Vaidya, J. C. Corena, S. Kiyomoto, S. Marsh, G. Guo, J. Zhang, and Y. Miyake. (2014). Opinions of People: Factoring in Privacy and Trust. SIGAPP Appl. Comput. Rev., vol. 14, no. 3, pp. 7–21.
E. Toch. (2014). Crowdsourcing privacy preferences in context-aware applications. Personal Ubiquitous Comput., vol. 18, no. 1, pp. 129–141.
A. R. Beresford and F. Stajano. (2003). Location privacy in pervasive computing. IEEE Pervasive computing, vol. 2, no. 1, pp. 46–55.
E. Kaasinen. (2003). User needs for location-aware mobile services. Personal and ubiquitous computing, vol. 7, no. 1, pp. 70–79.
J. B. Abdo, J. Demerjian, H. Chaouchi, T. Atechian, and C. Bassil. (2015). Privacy using mobile cloud computing. In Digital Information and Communication Technology and its Applications (DICTAP), 2015 Fifth International Conference, pp. 178–182. Beirut, Lebanon.
J. Krumm. (2009). A survey of computational location privacy. Personal and Ubiquitous Computing, vol. 13, pp. 391–399.
I. B. Amor, S. Benbernou, M. Ouziri, M. Nadif, and A. Bouguettaya. (2013). Data leak aware crowdsourcing in social network. In Web Information Systems Engineering-WISE 2011 and 2012 Workshops, A. Haller, G. Huang, Z. Huang, H. Paik, and Q. Z. Sheng, Eds. Springer Berlin Heidelberg, 2013, pp. 226–236.
S. S. Kanhere. (2011). Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces. In Mobile Data Management (MDM), 2011 12th IEEE International Conference, pp. 3–6. Lulea, Sweden.
W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, et al. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), vol. 32, p. 5.
T. Kandappu, V. Sivaraman, A. Friedman, and R. Boreli. (2014). Loki: a privacy-conscious platform for crowdsourced surveys. In Communication Systems and Networks (COMSNETS), 2014 Sixth International Conference, pp. 1–8. Bangalore, India.
S. Wang, L. Huang, M. Tian, W. Yang, H. Xu, and H. Guo. (2015). Personalized privacy-preserving data aggregation for histogram estimation. In 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. San Diego, CA, USA.
J. Mineraud, F. Lancerin, S. Balasubramaniam, M. Conti, and S. Tarkoma. (2015). You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data. In Trustcom/BigDataSE/ISPA, 2015 IEEE, pp. 523–530. Helsinki, Finland.
Y. Gong, Y. Guo, and Y. Fang. (2014). A privacy-preserving task recommendation framework for mobile crowdsourcing. In Global Communications Conference (GLOBECOM), 2014 IEEE, pp. 588–593. Austin, TX, USA.
Y. Gong, L. Wei, Y. Guo, C. Zhang, and Y. Fang. (2016). Optimal task recommendation for mobile crowdsourcing with privacy control. IEEE Internet of Things Journal, vol. 3, no. 5.
Y. Shen, L. Huang, L. Li, X. Lu, S. Wang, and W. Yang. (2015). Towards preserving worker location privacy in spatial crowdsourcing. In 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. San Diego, CA, USA.
S. Choi, G. Ghinita, and E. Bertino. (2014). Secure mutual proximity zone enclosure evaluation. In Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 133–142. Dallas, Texas.
A. Dua, N. Bulusu, W.-C. Feng, and W. Hu. (2009). Towards trustworthy participatory sensing. In Proceedings of the 4th USENIX conference on Hot topics in security, pp. 8–8. Montreal, Canada.
L. R. Varshney, A. Vempaty, and P. K. Varshney. (2014). Assuring privacy and reliability in crowdsourcing with coding. In Information Theory and Applications Workshop (ITA), pp. 1–6. San Diego, CA, USA.
R. Liu, J. Cao, L. Yang, and K. Zhang. (2015). PriWe: recommendation for privacy settings of mobile Apps based on crowdsourced users’ expectations. In Mobile Services (MS), 2015 IEEE International Conference, pp. 150–157. New York, NY, USA.
Y.-A. Sun, S. Roy, and G. Little. (2011).Beyond independent agreement: A tournament selection approach for quality assurance of human computation tasks. Human Computation, vol. 11, p. 11.
N. Kokkalis, T. Kohn, C. Pfeiffer, D. Chornyi, M. S. Bernstein, and S. R. Klemmer. (2013). EmailValet: managing email overload through private, accountable crowdsourcing. In Proceedings of the 2013 conference on Computer supported cooperative work, pp. 1291–1300. San Antonio, Texas, USA.
W. Li, S. A. Seshia, and S. Jha. (2012). CrowdMine: towards crowdsourced human-assisted verification. In Proceedings of the 49th Annual Design Automation Conference, pp. 1254–1255. San Francisco, CA, USA.
J. Sun and H. Ma. (2014). Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference, pp. 1–8. Shanghai, China.
W. Mason and D. J. Watts. (2010). Financial incentives and the performance of crowds. ACM SigKDD Explorations Newsletter, vol. 11, pp. 100–108.
J.-S. Lee and B. Ho. (2010). Sell your experiences: a market mechanism based incentive for participatory sensing. In Pervasive Computing and Communications (PerCom), 2010 IEEE International Conference, pp. 60–68. Mannheim, Germany.
L. G. Jaimes, I. Vergara-Laurens, and M. A. Labrador. (2012). A location-based incentive mechanism for participatory sensing systems with budget constraints. In Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference, pp. 103–108. Lugano, Switzerland.
A. J. Mashhadi, S. B. Mokhtar, and L. Capra. (2012). Fair content dissemination in participatory DTNs. Ad Hoc Networks, vol. 10, pp. 1633–1645.
X. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher. (2013). Artsense: Anonymous reputation and trust in participatory sensing. In INFOCOM, 2013 Proceedings IEEE, pp. 2517–2525. Turin, Italy.
C.-J. Ho, Y. Zhang, J. Vaughan, and M. Van Der Schaar. (2012). Towards social norm design for crowdsourcing markets. In Twenty-Sixth AAAI Conference on Artificial Intelligence.
D. Yang, G. Xue, X. Fang, and J. Tang. (2012). Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In Proceedings of the 18th annual international conference on mobile computing and networking, pp. 173–184. Istanbul, Turkey.
Z. Feng, Y. Zhu, Q. Zhang, L. M. Ni, and A. V. Vasilakos. (2014).TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In INFOCOM, 2014 Proceedings IEEE, pp. 1231–1239. Toronto, ON, Canada.
D. Zhao, X.-Y. Li, and H. Ma. (2014). How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint. In INFOCOM, 2014 Proceedings, pp. 1213–1221. Toronto, ON, Canada.
A. Singla, and A. Krause. (2013). Truthful incentives in crowdsourcing tasks using regret minimization mechanisms. In Proceedings of the 22nd international conference on World Wide Web, pp. 1167–1178. Rio de Janeiro, Brazil.
Y. Fan, H. Sun, Y. Zhu, X. Liu, and J. Yuan. (2015). A truthful online auction for tempo-spatial crowdsourcing tasks. In Service-Oriented System Engineering (SOSE), 2015 IEEE Symposium on, pp. 332–338. San Francisco Bay, CA, USA.
C.-C. Wu, K.-T. Chen, Y.-C. Chang, and C.-L. Lei. (2013). Crowdsourcing multimedia QoE evaluation: A trusted framework. IEEE Transactions on Multimedia, vol. 15, pp. 1121–1137.
T. Tian, J. Zhu, F. Xia, X. Zhuang, and T. Zhang. (2015). Crowd fraud detection in internet advertising. In Proceedings of the 24th International Conference on World Wide Web, pp. 1100–1110.
Y. Zhang and M. Van der Schaar. (2012). Reputation-based incentive protocols in crowdsourcing applications. In INFOCOM, 2012 Proceedings IEEE, pp. 2140–2148. Orlando, FL, USA.
H. Yu, Z. Shen, C. Miao, and B. An. (2012). Challenges and opportunities for trust management in crowdsourcing. In Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology, vol. 2, pp. 486–493.
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. (2005). Incognito: Efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pp. 49–60.
S. Wu, X. Wang, S. Wang, Z. Zhang, and A. K. Tung. (2014). K-anonymity for crowdsourcing database. IEEE Transactions on Knowledge and Data Engineering, vol. 26, pp. 2207–2221.
Y. He, L. Sun, Z. Li, H. Li, and X. Cheng. (2014). An optimal privacy-preserving mechanism for crowdsourced traffic monitoring. In Proceedings of the 10th ACM international workshop on Foundations of mobile computing, pp. 11–18.
J. Sun, R. Zhang, X. Jin, and Y. Zhang. (2016). SecureFind: Secure and privacy-preserving object finding via mobile crowdsourcing. IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp. 1716–1728.
X. Chen, X. Wu, X.-Y. Li, X. Ji, Y. He, and Y. Liu. (2016). Privacy-aware high-quality map generation with participatory sensing. IEEE Transactions on Mobile Computing, vol. 15, no. 3, pp. 719–732.
X. Chen, X. Wu, X.-Y. Li, Y. He, and Y. Liu. (2014). Privacy-preserving high-quality map generation with participatory sensing. In INFOCOM, 2014 Proceedings IEEE, pp. 2310–2318. Toronto, ON, Canada.
X. Wu, P. Yang, S. Tang, X. Zheng, and Y. Xiong. (2015). Privacy preserving RSS map generation for a crowdsensing network. IEEE Wireless Communications, vol. 22, pp. 42–48.
H. To, G. Ghinita, and C. Shahabi. (2014). A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment, vol. 7, no. 10, pp. 919–930.
M. Gruteser and D. Grunwald. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pp. 31–42. San Francisco, California.
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. (2008). Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pp. 121–132. Vancouver, Canada.
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. (2006). The new Casper: query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pp. 763–774. Seoul, Korea.
Z. Zhang, J. Han, J. Deng, X. Xu, F. Ringeval, and B. Schuller. (2018). Leveraging unlabeled data for emotion recognition with enhanced collaborative semi-supervised learning. IEEE Access, vol. 6, pp. 22196–22209.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Zhong, S. et al. (2019). Connecting Human to Cyber-World: Security and Privacy Issues in Mobile Crowdsourcing Networks. In: Security and Privacy for Next-Generation Wireless Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-01150-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-01150-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01149-9
Online ISBN: 978-3-030-01150-5
eBook Packages: Computer ScienceComputer Science (R0)