You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.
This book constitutes the refereed proceedings of the 18th International Conference on Innovations for Community Services, I4CS 2018, held in Žilina, Slovakia, in June 2018. The 14 revised full papers and the three revised short papers presented in this volume were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on architectures and management; data analytics and models; community and public collaboration; innovations and digital transformation.
This book constitutes the refereed proceedings of two workshops held in conjunction with the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, in Crete, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 14 full papers of the IWCS 2011 and 10 papers of the STAVE 2011 workshop were carefully reviewed and individually selected from the lectures given at each workshop. The International Workshop on Convergence Security in Pervasive Environments, IWCS 2011, addresses the various theories and practical applications of convergence security in pervasive environments. The International Workshop on Security & Trust for Applications in Virtualized Environments, STAVE 2011, shows how current virtualization increases the sharing of compute, network and I/O resources with multiple users and applications in order to drive higher utilization rates, what replaces the traditional physical isolation boundaries with virtual ones.
This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.
This book constitutes the thoroughly refereed proceedings of the 26th International Conference on Computer Networks, CN 2019, held in Gliwice, Poland, in June 2019. The 29 full papers presented were carefully reviewed and selected from 64 submissions. They are organized in topical sections on computer networks; communications; and queueing theory and queuing networks.
Today, Internet of Things (IoT) is ubiquitous as it is applied in practice in everything from Industrial Control Systems (ICS) to e-Health, e-commerce, Cyber Physical Systems (CPS), smart cities, smart parking, healthcare, supply chain management and many more. Numerous industries, academics, alliances and standardization organizations make an effort on IoT standardization, innovation and development. But there is still a need for a comprehensive framework with integrated standards under one IoT vision. Furthermore, the existing IoT systems are vulnerable to huge range of malicious attacks owing to the massive numbers of deployed IoT systems, inadequate data security standards and the resour...
This book constitutes revised selected papers from the refereed proceedings of the 5th The Global IoT Summit, GIoTS 2022, which took place in Dublin, Ireland, in June 20–23, 2022. The 33 full papers included in this book were carefully reviewed andselected from 75 submissions. They were organized in topical sections as follows: ioT enabling technologies; ioT applications, services and real implementations; ioT security, privacy and data protection; and ioT pilots, testbeds and experimentation results.
None