|
Showing 1 - 12 of
12 matches in All Departments
A heterogeneous network is a network which connects computers and
other devices with different operating systems, protocols, or
access technologies. By definition, managing heterogenous networks
is more difficult that homogenous networks. Confidentiality,
integrity, availability (CIA) remain the foundation of security.
This book sheds light upon security threats, defenses, and
remediation on various networking and data processing domains,
including wired networks, wireless networks, mobile ad-hoc
networks, wireless sensor networks, and social networks through the
prisms of confidentiality, integrity, availability, authentication,
and access control. The book is broken into different chapters that
explore central subjects and themes in the development of the
heterogenous networks we see today. The chapters look at: Access
control methods in cloud-enabled Internet of Things Secure routing
algorithms for mobile ad-hoc networks Building security trust in
mobile ad-hoc networks using soft computing methods The use and
development of Blockchain technology, with a particular focus on
the nonce-free hash generation in Blockchain Password
authentication and keystroke biometrics Health care data analytics
over Big Data Bluetooth: and its open issues for managing security
services in heterogenous networks Managing Security Services in
Heterogenous Networks will be a valuable resource for a whole host
of undergraduate and postgraduate students studying related topics,
as well as career professionals who have to effectively manage
heterogenous networks in the workplace.
A heterogeneous network is a network which connects computers and
other devices with different operating systems, protocols, or
access technologies. By definition, managing heterogenous networks
is more difficult that homogenous networks. Confidentiality,
integrity, availability (CIA) remain the foundation of security.
This book sheds light upon security threats, defenses, and
remediation on various networking and data processing domains,
including wired networks, wireless networks, mobile ad-hoc
networks, wireless sensor networks, and social networks through the
prisms of confidentiality, integrity, availability, authentication,
and access control. The book is broken into different chapters that
explore central subjects and themes in the development of the
heterogenous networks we see today. The chapters look at: Access
control methods in cloud-enabled Internet of Things Secure routing
algorithms for mobile ad-hoc networks Building security trust in
mobile ad-hoc networks using soft computing methods The use and
development of Blockchain technology, with a particular focus on
the nonce-free hash generation in Blockchain Password
authentication and keystroke biometrics Health care data analytics
over Big Data Bluetooth: and its open issues for managing security
services in heterogenous networks Managing Security Services in
Heterogenous Networks will be a valuable resource for a whole host
of undergraduate and postgraduate students studying related topics,
as well as career professionals who have to effectively manage
heterogenous networks in the workplace.
This book highlights recent research on bio-inspired computing and
its various innovative applications in information and
communication technologies. It presents 51 high-quality papers from
the 11th International Conference on Innovations in Bio-Inspired
Computing and Applications (IBICA 2020) and 10th World Congress on
Information and Communication Technologies (WICT 2020), which was
held online during December 16-18, 2019. As a premier conference,
IBICA-WICT brings together researchers, engineers and practitioners
whose work involves bio-inspired computing, computational
intelligence and their applications in information security,
real-world contexts, etc. Including contributions by authors from
25 countries, the book offers a valuable reference guide for all
researchers, students and practitioners in the fields of Computer
Science and Engineering.
This book highlights recent research on intelligent systems and
nature-inspired computing. It presents 62 selected papers from the
19th International Conference on Intelligent Systems Design and
Applications (ISDA 2019), which was held online. The ISDA is a
premier conference in the field of computational intelligence, and
the latest installment brought together researchers, engineers and
practitioners whose work involves intelligent systems and their
applications in industry. Including contributions by authors from
33 countries, the book offers a valuable reference guide for all
researchers, students and practitioners in the fields of Computer
Science and Engineering.
This book highlights recent research on bio-inspired computing and
its various innovative applications in information and
communication technologies. It presents 38 high-quality papers from
the 10th International Conference on Innovations in Bio-Inspired
Computing and Applications (IBICA 2019) and 9th World Congress on
Information and Communication Technologies (WICT 2019), which was
held at GIET University, Gunupur, India, on December 16-18, 2019.
As a premier conference, IBICA-WICT brings together researchers,
engineers and practitioners whose work involves bio-inspired
computing, computational intelligence and their applications in
information security, real-world contexts, etc. Including
contributions by authors from 18 countries, the book offers a
valuable reference guide for all researchers, students and
practitioners in the fields of Computer Science and Engineering.
This book gathers high-quality research papers presented at the
International Conference on Computing in Engineering and Technology
(ICCET 2020) [formerly ICCASP], a flagship event in the area of
engineering and emerging next-generation technologies jointly
organized by the Dr. Babasaheb Ambedkar Technological University
and MGM's College of Engineering in Nanded, India, on 9-11 January
2020. Focusing on next-generation information processing systems,
this second volume of the proceedings includes papers on cloud
computing and information systems, artificial intelligence and the
Internet of Things, hardware design and communication, and
front-end design.
This book presents some of the emerging techniques and technologies
used to handle Web data management. Authors present novel software
architectures and emerging technologies and then validate using
experimental data and real world applications. The contents of this
book are focused on four popular thematic categories of intelligent
Web data management: cloud computing, social networking, monitoring
and literature management. The Volume will be a valuable reference
to researchers, students and practitioners in the field of Web data
management, cloud computing, social networks using advanced
intelligence tools.
This book presents some of the emerging techniques and technologies
used to handle Web data management. Authors present novel software
architectures and emerging technologies and then validate using
experimental data and real world applications. The contents of this
book are focused on four popular thematic categories of intelligent
Web data management: cloud computing, social networking, monitoring
and literature management. The Volume will be a valuable reference
to researchers, students and practitioners in the field of Web data
management, cloud computing, social networks using advanced
intelligence tools.
This book highlights recent research on intelligent systems and
nature-inspired computing. It presents 223 selected papers from the
22nd International Conference on Intelligent Systems Design
and Applications (ISDA 2022), which was held online. The ISDA is a
premier conference in the field of computational intelligence, and
the latest installment brought together researchers, engineers, and
practitioners whose work involves intelligent systems and their
applications in industry. Including contributions by authors from
65 countries, the book offers a valuable reference guide for all
researchers, students, and practitioners in the fields of computer
science and engineering. Â Â
This book mainly introduces an essential safety concept and
procedure for electrical engineering in oil and gas field. It
begins by providing broad guidelines for performing electrical
safety and operability review (ELSOR), giving reader a general
overview of the field. It subsequently verifies electrical
distribution, overhead line and hazardous area classification
safety analysis together with comparison of different international
codes and standards with China national codes, to interpret
different safety concepts from different countries for electrical
engineering in oil and gas field. This unique and complete
co-design safety analysis will greatly benefit international
electrical engineers and operators of oil and gas fields. This book
is with vivid flow chart, accurate table expressing the analysis
logic method and exact illustrations of code and standard of
different country and area. This book stresses the electrical
design safety for surface facilities of oil and gas oil field and
will benefit to engineer who works with oil and gas field surface
facilities engineering.
This book mainly introduces an essential safety concept and
procedure for electrical engineering in oil and gas field. It
begins by providing broad guidelines for performing electrical
safety and operability review (ELSOR), giving reader a general
overview of the field. It subsequently verifies electrical
distribution, overhead line and hazardous area classification
safety analysis together with comparison of different international
codes and standards with China national codes, to interpret
different safety concepts from different countries for electrical
engineering in oil and gas field. This unique and complete
co-design safety analysis will greatly benefit international
electrical engineers and operators of oil and gas fields. This book
is with vivid flow chart, accurate table expressing the analysis
logic method and exact illustrations of code and standard of
different country and area. This book stresses the electrical
design safety for surface facilities of oil and gas oil field and
will benefit to engineer who works with oil and gas field surface
facilities engineering.
|
|