![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020. The 91 full papers and workshop papers were carefully reviewed and selected from 200 submissions. Part I - LNICST 357 - details original research and results of wireless and satellite technology for a smarter global communication architecture. The theme of WISATS 2020 is "Intelligent Wireless and Satellite Communications for Beyond 5G". Part II - LNICST 358 - presents 6 workshop papers: High Speed Space Communication and Space Information Networks (HSSCSIN); Integrated Space and Onboard Networks (ISON); Intelligent Satellite Operations, Managements, and Applications (ISOMA); Intelligent Satellites in Future Space Networked System (ISFSNS); Satellite Communications, Networking and Applications (SCNA); Satellite Internet of Things; Trusted Data Sharing, Secure Communication (SIOTTDSSC).
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
This book constitutes the post-conference proceedings of the Second EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2020, held in December 2020. Due to COVID-19 pandemic the conference was held virtually.The 52 full papers were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Deep Learning/Machine Learning on Information and Signal Processing; AI in Ubiquitous Mobile Wireless Communications; AI in UAV-assisted wireless communications; Smart Education: Educational Change in the age of artificial Intelligence; AI in SAR/ISAR Target Detection; Recent advances in AI and their applications in future electronic and information field.
This two-wolume set (CCIS 1395-1396) constitutes the refereed proceedings of the Third International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2020, held in Taganrog, Russia, in October 2020.The 80 revised full papers presented were carefully reviewed and selected from 291 submissions. The prime aim of the conference is to invite researchers from different domains of network and communication technologies to a single platform to showcase their research ideas. The selected papers are organized in topical sections on communication technologies; security and privacy; futuristic computing technologies; network and computing technologies; wireless networks and Internet of Things (IoT).
Explore the rise of SD-WAN with CISCO and transform your existing WAN into an agile, efficient, and cost-effective network. Learning SD-WAN with Cisco helps you understand the development of SD-WAN and its benefits to modern networks. This book starts with an exploration of the different components of SD-WAN, such as vBond for orchestration, vManage for management, vSmart for control, and the vEdge devices. From there, it moves on to building a network from the ground up using EVE-NG, focusing on how to install EVE-NG, get the required licenses via a SmartNET account, download the components, and begin to create your network by installing vManage. Once you have this foundation, you will create the organization and certificates, and look at local users as well as single- and multi-tenancy options and clustering. As you continue to build your network, you will dig down into the overlay protocols used in SD-WAN, and then deploy your controllers and edge devices, looking at zero-touch provisioning along the way. After building your network, you will configure and apply policies and templates to manage the control and data planes as well as VPNs, Internet access, security, and quality of service. The book also explores reporting and management using vManage, along with upgrading and troubleshooting the various components, using techniques from simple ping and trace route through to advanced techniques such as DTLS and TLOC troubleshooting and traffic simulation. After reading this book, you will have hands-on experience working with SD-WAN. You will understand how to deploy, configure, manage, and troubleshoot it. What You Will Learn Know what SD-WAN is, how it came about, and why we need it Understand troubleshooting and traffic simulation of DTLS and TLOC Monitor, report, and troubleshoot the SD-WAN environment Who This Book Is For Network professionals with experience in Linux and Cisco devices
This book constitutes extended and revised versions of the selected papers from the 13th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2020, held in Valletta, Malta, in February 2020.The 29 revised and extended full papers presented were carefully reviewed and selected from a total of 363 submissions. The papers are organized in topical sections on biomedical electronics and devices; bioimaging; bioinformatics models, methods and algorithms; bio-inspired systems and signal processing; health informatic
This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.
This book constitutes the refereed post-conference proceedings of the 6st International Conference on IoT as a Service, IoTaaS 2020, which took place in Xi'an, China, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 69 revised full papers were carefully reviewed and selected from 136 submissions. The papers present two technical tracks and three workshops: The Second Workshop on Edge Intelligence and Computing for Iot Communications and Applications, the Workshop on Satellite Communication Networks for Internet of Things, the Workshop on Satellite Communications
This proceedings constitutes the refereed proceedings of the 15th EAI International Conference on Communications and Networking, ChinaCom 2020, held in November 2020 in Shanghai, China. Due to COVID-19 pandemic the conference was held virtually. The 54 papers presented were carefully selected from 143 submissions. The papers are organized in topical sections on Transmission Optimization in Edge Computing; Performance and Scheduling Optimization in Edge Computing; Mobile Edge Network System; Communication Routing and Control; Transmission and Load Balancing; Edge Computing and Distributed Machine Learning; Deep Learning.
This book offers a collection of high-quality peer-reviewed research papers presented at the Second International Conference on Communication and Computational Technologies (ICCCT 2019), held at Rajasthan Institute of Engineering and Technology, Jaipur, Rajasthan, India, on 30-31 August 2019. In contributions prepared by researchers from academia and industry alike, the book discusses a wide variety of industrial, engineering and scientific applications of emerging techniques.
This book provides key ideas for the design and analysis of complex energy management systems (EMS) for distributed power networks. Future distributed power networks will have strong coupling with (electrified) mobility and information-communication technology (ICT) and this book addresses recent challenges for electric vehicles in the EMS, and how to synthesize the distributed power network using ICT. This book not only describes theoretical developments but also shows many applications using test beds and provides an overview of cutting edge technologies by leading researchers in their corresponding fields. Describes design and analysis of energy management systems; Illustrates the synthesis of distributed energy management systems based on aggregation of local agents; Discusses dependability issues of the distributed EMS with emphasis on the verification scheme based on remote-operational hardware-in-the-loop (HIL) simulation and cybersecurity.
This book constitutes the refereed post-conference proceedings of the Third International Symposium on Benchmarking, Measuring, and Optimization, Bench 2020, held virtually in November 2020.The 12 revised full papers and 1 revised short paper presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections named: best paper session; data management and storage; supercomputing; benchmarking on GPU; and application and dataset.
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020. The 91 full papers and workshop papers were carefully reviewed and selected from 200 submissions. Part I - LNICST 357 - details original research and results of wireless and satellite technology for a smarter global communication architecture. The theme of WISATS 2020 is "Intelligent Wireless and Satellite Communications for Beyond 5G". Part II - LNICST 358 - presents 6 workshop papers: High Speed Space Communication and Space Information Networks (HSSCSIN); Integrated Space and Onboard Networks (ISON); Intelligent Satellite Operations, Managements, and Applications (ISOMA); Intelligent Satellites in Future Space Networked System (ISFSNS); Satellite Communications, Networking and Applications (SCNA); Satellite Internet of Things; Trusted Data Sharing, Secure Communication (SIOTTDSSC).
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Modelling and Simulation for Autonomous Systems, MESAS 2020, held in Prague, Czech Republic, in October 2020.*The 19 full papers included in the volume were carefully reviewed and selected from 26 submissions. They are organized in the following topical sections: future challenges of advanced M&S technology; M&S of intelligent systems - R&D and application; and AxS/AI in context of future warfare and security environment. *The conference was held virtually.
This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs). Unlike other books on the topic, it focuses on the networking aspects of WSNs, discussing the most important networking issues, including network architecture design, medium access control, routing and data dissemination, node clustering, node localization, query processing, data aggregation, transport and quality of service, time synchronization, and network security. Featuring contributions from researchers, this book strikes a balance between fundamental concepts and new technologies, providing readers with unprecedented insights into WSNs from a networking perspective. It is essential reading for a broad audience, including academics, research engineers, and practitioners, particularly postgraduate/postdoctoral researchers and engineers in industry. It is also suitable as a textbook or supplementary reading for graduate computer engineering and computer science courses.
This book presents the combined proceedings of the 10th International Conference on Computer Science and its Applications (CSA 2018) and the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), both held in Kuala Lumpur, Malaysia, Dec 17 - 19, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.
This book solicits the innovative research ideas and solutions for almost all the intelligent data intensive theories and application domains. The proliferation of various mobile and wireless communication networks has paved way to foster a high demand for intelligent data processing and communication technologies. The potential of data in wireless mobile networks is enormous, and it constitutes to improve the communication capabilities profoundly. As the networking and communication applications are becoming more intensive, the management of data resources and its flow between various storage and computing resources are posing significant research challenges to both ICT and data science community. The general scope of this book covers the design, architecture, modeling, software, infrastructure and applications of intelligent communication architectures and systems for big data or data-intensive applications. In particular, this book reports the novel and recent research works on big data, mobile and wireless networks, artificial intelligence, machine learning, social network mining, intelligent computing technologies, image analysis, robotics and autonomous systems, data security and privacy.
This book focuses on the development and implementation of cloud-based, complex software that allows parallelism, fast processing, and real-time connectivity. Software engineering (SE) is the design, development, testing, and implementation of software applications, and this discipline is as well developed as the practice is well established whereas the Cloud Software Engineering (CSE) is the design, development, testing, and continuous delivery of service-oriented software systems and applications (Software as a Service Paradigm). However, with the emergence of the highly attractive cloud computing (CC) paradigm, the tools and techniques for SE are changing. CC provides the latest software development environments and the necessary platforms relatively easily and inexpensively. It also allows the provision of software applications equally easily and on a pay-as-you-go basis. Business requirements for the use of software are also changing and there is a need for applications in big data analytics, parallel computing, AI, natural language processing, and biometrics, etc. These require huge amounts of computing power and sophisticated data management mechanisms, as well as device connectivity for Internet of Things (IoT) environments. In terms of hardware, software, communication, and storage, CC is highly attractive for developing complex software that is rapidly becoming essential for all sectors of life, including commerce, health, education, and transportation. The book fills a gap in the SE literature by providing scientific contributions from researchers and practitioners, focusing on frameworks, methodologies, applications, benefits and inherent challenges/barriers to engineering software using the CC paradigm.
Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and considers the theoretical problems in WSN, including issues with monitoring, routing, and power control. It also details methodologies that can provide solutions to these problems. The book's 25 chapters are divided into seven parts: Data Collection Physical Layer and Interfacing Routing and Transport Protocols Energy-Saving Approaches Mobile and Multimedia WSN Data Storage and Monitoring Applications The book examines applications of WSN across a range of fields, including health, military, transportation, and mining. Addressing the main challenges in applying WSNs across all phases of our life, it explains how WSNs can assist in community development. Complete with a list of references at the end of each chapter, this book is ideal for senior undergraduate and postgraduate students, researchers, scholars, academics, industrial researchers, and practicing engineers working on WSNs. The text assumes that readers possess a foundation in computer networks, wireless communication, and basic electronics.
This book constitutes the revised selected papers of the 17th Smoky Mountains Computational Sciences and Engineering Conference, SMC 2020, held in Oak Ridge, TN, USA*, in August 2020.The 36 full papers and 1 short paper presented were carefully reviewed and selected from a total of 94 submissions. The papers are organized in topical sections of computational applications: converged HPC and artificial intelligence; system software: data infrastructure and life cycle; experimental/observational applications: use cases that drive requirements for AI and HPC convergence; deploying computation: on the road to a converged ecosystem; scientific data challenges. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of the 13th IFIP WG 5.11 International Symposium on Environmental Software Systems, ISESS 2020, held in Wageningen, The Netherlands, in February 2020. The 22 full papers and 3 short papers were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics on environmental informatics, including data mining, artificial intelligence, high performance and cloud computing, visualization and smart sensing for environmental, earth, agricultural and food applications.
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.
This volume constitutes the refereed post-conference proceedings of the 5th International Conference on Machine Learning and Intelligent Communications, MLICOM 2020, held in Shenzhen, China, in September 2020. Due to COVID-19 pandemic the conference was held virtually. The 55 revised full papers were carefully selected from 133 submissions. The papers are organized thematically in intelligent resource ( spectrum, power) allocation schemes; applications of neural network and deep learning; decentralized learning for wireless communication systems; intelligent antennas design and dynamic configuration; intelligent communications; intelligent positioning and navigation systems; smart unmanned vehicular technology; intelligent space and terrestrial integrated networks; machine learning algorithm and Intelligent networks.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. |
![]() ![]() You may like...
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, …
Hardcover
R2,621
Discovery Miles 26 210
Artificial Intelligence Applications and…
Ilias Maglogiannis, Lazaros Iliadis, …
Hardcover
R3,018
Discovery Miles 30 180
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,422
Discovery Miles 34 220
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, …
Hardcover
R8,563
Discovery Miles 85 630
Digital Transformation of Collaboration…
Aleksandra Przegalinska, Francesca Grippa, …
Hardcover
R3,219
Discovery Miles 32 190
|