You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 8th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2015, held in Sousse, Tunisia, in May 2015. The 20 papers presented in this volume were carefully reviewed and selected from 27 submissions. The contributions are organized in topical sections named: road; rail; and air.
This book constitutes the joint refereed proceedings of the 5th International Workshop on Communication Technologies for Vehicles/Trains, Nets4Cars 2013 and Nets4Trains 2013, held in Vilnius, Lithuania, in May 2013. The 12 full papers of the road track and 5 full papers of the rail track presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. They address topics such as intra-vehicle, inter-vehicle and vehicle to infrastructure communications (protocols and standards), mobility and traffic models (models, methodologies, and techniques), testing, and applications.
This book constitutes the refereed proceedings of the 15th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, held in Bordeaux, France, in November 2020. The 18 full papers were carefully reviewed and selected from 22 submissions. The selected papers present orig-inal research results in areas related to the physical layer, communication protocols and standards, mobility and traffic models, experimental and field operational testing, and performance analysis.
This book constitutes the proceedings of the 6th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2014, held in Offenburg, Germany in May 2014. The 10 papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains 4 invited papers. The contributions are organized in topical sections named: automotive issues, car-to-car, aviation issues, in-car, and infrastructures.
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – not only to keep up with cyber criminals, but also to stay one step ahead. Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.
Software Networks describe new concepts for the Internets next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network. This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, router...
The adoption of smartphones has had as a corollary the use of services that require streaming, such as video streaming, which is a constraint for the 4G mobile network. The integration of the network of Wi-Fi hotspots deployed by the operators adds capacity to the 4G mobile network. The use of Wi-Fi technology in carrier networks is the result of developments coordinated by the IEEE, WFA and WBA standardization bodies. For its part, the 3GPP standardization body has been working to integrate Wi-Fi technology into the 4G mobile network. The first part of this book presents the characteristics of the Wi-Fi radio interface. The different IEEE 802.11b / g / n / ac physical layers characterize th...