E-Book, Englisch, Band 235, 392 Seiten, eBook
Hu / Khalil / Tari Mobile Networks and Management
Erscheinungsjahr 2018
ISBN: 978-3-319-90775-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings
E-Book, Englisch, Band 235, 392 Seiten, eBook
ISBN: 978-3-319-90775-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications.- Persistent vs Service IDs in Android: Session Fingerprinting from Apps.- Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques.- Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework.- Robust Fingerprint Matching Based on Convolutional Neural Networks.- A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data.- Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling.- Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring.- Estimating public opinion in social media content using aspect-based opinion mining.- A Robust Contactless Fingerprint Enhancement Algorithm.- Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and MachineLearning.- A Variant of BLS Signature Scheme With Tight Security Reduction.- Quantum authentication scheme based on fingerprintencoded graph states.- Cooperative Information Security/ Cybersecurity Curriculum Development.- An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks.- Homomorphic Evaluation of Database Queries.- A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks.- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs.- Performance Assessment of Cloud Migrations from Network and Application Point of View.- A Cloud Service Enhanced Method Supporting Context-aware Applications.- Application of 3D Delaunay Triangulation in Fingerprint Authentication System.- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs.- Performance Assessment of Cloud Migrations from Network and Application Point of View.- A Cloud Service Enhanced Method Supporting Context-aware Applications.- Application of 3D Delaunay Triangulation in Fingerprint Authentication System.- The Public Verifiability of Public Key Encryption with Keyword Search.- Malicious Bitcoin Transaction Tracing Using Incidence.- Relation Clustering.- Cryptanalysis of Salsa and ChaCha: Revisited.- CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.- Probability Risk Identification Based Intrusion Detection System for SCADA Systems.- Anonymizing k-NN Classification on MapReduce.- A Cancellable Ranking based Hashing Method for Fingerprint Template Protection.