LEADER 04543nam 22005895 450 001 9910847586303321 005 20240701123013.0 010 $a3-031-57916-X 024 7 $a10.1007/978-3-031-57916-5 035 $a(MiAaPQ)EBC31255228 035 $a(Au-PeEL)EBL31255228 035 $a(CKB)31428320200041 035 $a(MiAaPQ)EBC31319715 035 $a(Au-PeEL)EBL31319715 035 $a(DE-He213)978-3-031-57916-5 035 $a(EXLCZ)9931428320200041 100 $a20240408d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Information Networking and Applications $eProceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 4 /$fedited by Leonard Barolli 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (510 pages) 225 1 $aLecture Notes on Data Engineering and Communications Technologies,$x2367-4520 ;$v202 311 $a3-031-57915-1 327 $aThe Deployment of E-Learning Application as a Web Service in a Cloud Broker Architecture -- CarbonApp: Blockchain Enabled Carbon Offset Project Management -- Investigating the Impact of Congestion Control Algorithms on Edge-Cloud Continuum -- Design and Implementation of a Fuzzy-based System for Assessment of Relationship Trust -- BarongTrace: A Malware Event Log Dataset for Linux -- Specifying SSI over EAP: Towards an Even Better Eduroam in the Future -- FastSGX: A Message-passing based Runtime for SGX -- Leveraging Chat-Based Large Vision-Language Models for Multimodal Out-of-Context Detection -- Enhancing the 5G-AKA Protocol with Post-Quantum Digital Signature Method -- SoK: Directions and Issues in Formal Verification of Payment Protocols -- PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNN -- Design and Performance Evaluation of a Two-stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds -- Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings -- Towards User-Oriented Steganography -- AI-based Cybersecurity Systems. 330 $aThe aim of the book is to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence, and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure, and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next-generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design, and applications of computer networks, distributed computing, and information systems. 410 0$aLecture Notes on Data Engineering and Communications Technologies,$x2367-4520 ;$v202 606 $aEngineering$xData processing 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aData Engineering 606 $aComputational Intelligence 606 $aArtificial Intelligence 615 0$aEngineering$xData processing. 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 14$aData Engineering. 615 24$aComputational Intelligence. 615 24$aArtificial Intelligence. 676 $a620.00285 700 $aBarolli$b Leonard$0846885 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910847586303321 996 $aAdvanced Information Networking and Applications$94156131 997 $aUNINA