Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Traffic Monitoring and Analysis
  • Language: en
  • Pages: 184

Traffic Monitoring and Analysis

This book constitutes the proceedings of the 4th International Workshop on Traffic Monitoring and Analysis, TMA 2012, held in Vienna, Austria, in March 2012. The thoroughly refereed 10 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 31 submissions. The contributions are organized in topical sections on traffic analysis and characterization: new results and improved measurement techniques; measurement for QoS, security and service level agreements; and tools for network measurement and experimentation.

Trends in Data Protection and Encryption Technologies
  • Language: en
  • Pages: 255

Trends in Data Protection and Encryption Technologies

This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a refer...

Passive and Active Measurement
  • Language: en
  • Pages: 330

Passive and Active Measurement

This book constitutes the proceedings of the 21st International Conference on Passive and Active Measurement, PAM 2020, which was planned to be held in Eugene, Oregon, USA, in March 2020. Due to the Corona pandemic, the conference was organized as a virtual meeting. The 19 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They were organized in topical sections named: active measurement; security; best practices and conformance; domain names; topology and routing; topology - alias resolution; and Web.

Passive and Active Measurement
  • Language: en
  • Pages: 376

Passive and Active Measurement

  • Type: Book
  • -
  • Published: 2015-03-03
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 16th International Conference on Passive and Active Measurement, PAM 2015, held in New York, NY, USA, in March 2015. The 27 full papers presented were carefully reviewed and selected from 100 submissions. The papers have been organized in the following topical sections: DNS and Routing, Mobile and Cellular, IPv6, Internet-Wide, Web and Peer-to-Peer, Wireless and Embedded, and Software Defined Networking.

Detection of Intrusions and Malware, and Vulnerability Assessment
  • Language: en
  • Pages: 251

Detection of Intrusions and Malware, and Vulnerability Assessment

  • Type: Book
  • -
  • Published: 2013-03-15
  • -
  • Publisher: Springer

This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012. The 10 revised full papers presented together with 4 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on malware, mobile security, secure design, and intrusion detection systems (IDS).

Applications of Secure Multiparty Computation
  • Language: en
  • Pages: 264

Applications of Secure Multiparty Computation

  • Type: Book
  • -
  • Published: 2015-07-30
  • -
  • Publisher: IOS Press

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computation (SMC), a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. SMC has been the subject of academic study for more than 30 years, but first attempts to use it for actual computations in the early 2000s – although theoretically efficient – were initially not practicable. Howe...

Traffic Monitoring and Analysis
  • Language: en
  • Pages: 249

Traffic Monitoring and Analysis

  • Type: Book
  • -
  • Published: 2015-04-16
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 7th International Workshop on Traffic Monitoring and Analysis, TMA 2015, held in Barcelona, Spain, in April 2015. The 16 full papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections on measurement tools and methods; mobile and wireless; Web; security; and new protocols.

Managing Virtualization of Networks and Services
  • Language: en
  • Pages: 280

Managing Virtualization of Networks and Services

  • Type: Book
  • -
  • Published: 2007-09-29
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 18th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management, DSOM 2007, held in the course of the 3rd International Week on Management of Networks and Services, Manweek 2007. It covers peer-to-peer management, fault detection and diagnosis, performance tuning and dimensioning, problem detection and mitigation, operations and tools, service accounting and auditing, Web services and management.

Social Data Analytics
  • Language: en
  • Pages: 251

Social Data Analytics

  • Type: Book
  • -
  • Published: 2022-08-01
  • -
  • Publisher: CRC Press

This book is an introduction to social data analytics along with its challenges and opportunities in the age of Big Data and Artificial Intelligence. It focuses primarily on concepts, techniques and methods for organizing, curating, processing, analyzing, and visualizing big social data: from text to image and video analytics. It provides novel techniques in storytelling with social data to facilitate the knowledge and fact discovery. The book covers a large body of knowledge that will help practitioners and researchers in understanding the underlying concepts, problems, methods, tools and techniques involved in modern social data analytics. It also provides real-world applications of social...

Passive and Active Network Measurement
  • Language: en
  • Pages: 385

Passive and Active Network Measurement

This book constitutes the refereed proceedings of the 6th International Workshop on Passive and Active Measurement, PAM 2005, held in Boston, MA, USA in March/April 2005. The 24 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections on TCP measurements, application measurements, network inference and problem diagnosis, topology measurements, wireless network measurements, monitoring facilities, routing and traffic engineering measurements, and spectroscopy and bandwidth estimation.