|
|
Showing 1 - 2 of
2 matches in All Departments
This important text addresses the latest issues in end-to-end
resilient routing in communication networks. The work highlights
the main causes of failures of network nodes and links, and
presents an overview of resilient routing mechanisms, covering
issues related to the Future Internet (FI), wireless mesh networks
(WMNs), and vehicular ad-hoc networks (VANETs). Features: discusses
FI architecture for network virtualization; introduces proposals
for dedicated and shared protection in random failure scenarios and
against malicious activities; describes measures for WMN
survivability that allow for evaluation of performance under
multiple failures; proposes a new scheme to enable proactive
updates of WMN antenna alignment; includes a detailed analysis of
the differentiated reliability requirements for VANET applications,
with a focus on issues of multi-hop data delivery; reviews
techniques for improving the stability of end-to-end VANET
communication paths based on multipath routing and anycast
forwarding.
|
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings (Paperback, 1st ed. 2017)
Jacek Rak, John Bay, Igor Kotenko, Leonard J. Popyack, Victor A. Skormin, …
|
R2,354
Discovery Miles 23 540
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 7th
International Conference on Mathematical Methods, Models, and
Architectures for Computer Network Security, MMM-ACNS 2017, held in
Warsaw, Poland, in August 2017. The 12 revised full papers, 13
revised short presentations, and 3 invited papers were carefully
reviewed and selected from a total of 40 submissions. The papers
are organized in topical sections on Critical Infrastructure
Protection and Visualization; Security and Resilience of Network
Systems; Adaptive Security; Anti-malware Techniques: Detection,
Analysis, Prevention; Security of Emerging Technologies; Applied
Cryptography; New Ideas and Paradigms for Security.
|
|