You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and timely detection methods. Current static and dynamic methods do not provide efficient detection, especially when dealing with zero-day attacks. For this reason, big data analytics and machine intelligencebased techniques can be used. This book brings together researchers in the field of big data analytics and intelligent systems for cyber threat in...
This book is a collection of speeches and lectures delivered by political luminaries, practitioners and noted scholars on South Asian security at the Institute of South Asian Studies, National University of Singapore.It offers interesting insights on the emerging security dynamics of South Asia. The issues covered are highly topical and include analyses of the conflict in Afghanistan, counter-terrorism in Pakistan, conflict management in Kashmir, post-conflict restructuring in Nepal and militarization in Asia. Some of the chapters provide in-depth analyses of the regional power politics and competing foreign policy priorities, with particular emphasis on India, the major regional power. Indi...
The essential guide to the state of the art in WDM and its vast networking potential As a result of its huge transmission capacity and countless other advantages, fiber optics has fostered a bandwidth revolution, addressing the constantly growing demand for increased bandwidth. Within this burgeoning area, Wavelength Division Multiplexing (WDM) has emerged as a breakthrough technology for exploiting the capacity of optical fibers. Today, WDM is deployed by many network providers for point-to-point transmission-but there is strong momentum to develop it as a full-fledged networking technology in its own right. The telecommunications industry, network service providers, and research communitie...
This work addresses the topic of optical networks cross-layer design with a focus on physical-layer-impairment-aware design. Contributors captures both the physical-layer-aware network design as well as the latest advances in service-layer-aware network design. Treatment of topics such as, optical transmissions which are prone to signal impairments, dense packing of wavelengths, dispersion, crosstalk, etc., as well as how to design the network to mitigate such impairments, are all covered.
This book constitutes the refereed proceedings of the Third IFIP-TC6 Networking Conference, NETWORKING 2004, held in Athens, Greece, in May 2004. The 103 revised full papers and 40 revised short papers were carefully reviewed and selected from 539 submissions. The papers are organized in topical sections on network security; TCP performance; ad-hoc networks; wavelength management; multicast; wireless network performance; inter-domain routing; packet classification and scheduling; services and monitoring; admission control; competition in networks; 3G/4G wireless systems; MPLS and related technologies; flow and congestion control; performance of IEEE 802.11; optical networks; TCP and congestion; key management; authentication and DOS prevention; energy aspects of wireless networks; optical network access; routing in ad-hoc networks; fault detection, restoration, and tolerance; QoS metrics, algorithms, and architecture; content distribution, caching, and replication; and routing theory and path computation.
This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
This book presents the practical motivation, theoretical description, and extant techniques for traffic grooming in optical networks. The description of the various topics of research will be authored by leading researchers in this area, and will contain comprehensive description of related literature for each area. This book is intended to be a definitive reference and text for traffic grooming both for the practitioner in industry and the student in academia.
This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT).
We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. ...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Broadband Communications, Networks and Systems (BROADNETS 2010) held in October 2010 in Athens, Greece. The 39 revised full papers were carefully selected from numerous submissions. The conference was divided in 3 tracks: Optical, Wireless and Internet. The optical track covers topics such as optical switch architectures, reliable optical networking, routing, wavelength assignment, and traffic grooming, network control and management. The wireless track highlights MIMO and OFDM techniques, mobility management, routing protocols, hybrid networks and the internet track covers routing, scheduling, security, trust, semantic technologies and social networks.