LEADER 04505nam 22006255 450 001 9910983372603321 005 20251229074533.0 010 $a9783031781315 010 $a3031781317 024 7 $a10.1007/978-3-031-78131-5 035 $a(CKB)37133938200041 035 $a(MiAaPQ)EBC31874002 035 $a(Au-PeEL)EBL31874002 035 $a(OCoLC)1484075766 035 $a(BIP)119802435 035 $a(BIP)119389796 035 $a(DE-He213)978-3-031-78131-5 035 $a(EXLCZ)9937133938200041 100 $a20250103d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a2nd International Conference on Cloud Computing and Computer Networks $eCCCN 2024 /$fedited by Lei Meng 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (159 pages) 225 1 $aSignals and Communication Technology,$x1860-4870 311 08$a9783031781308 311 08$a3031781309 327 $aPart I: Computer Networks and Information Security -- Chapter 1: Convolutional Dictionary Super-resolution Network for Removing CT Metal Artifacts -- Chapter 2: Information and Communication Technology (ICT) based Temperature Monitoring for Cold Chain Management in Immunization Information System -- Chapter 3: Detecting the Unknown: Evaluating the Efficacy of Host-based Intrusion Detection Systems (IDS) in Zero-day Attacks -- Chapter 4: Performance Evaluation of Security Mechanisms for Erasure coded System in Hadoop -- Part II: Mobile Communication and Wireless Technology -- Chapter 5: Genetic Algorithms for Solving the Demand Clustering and Spectrum Allocation Problem -- Chapter 6: Virtual scan based approach for coverage hole detection in Wireless Sensor Networks -- Chapter 7: Multi-hash Chain Based Key Pre-distribution for Wireless Sensor Networks -- Part III: Mobile Applications and Data Security -- Chapter 8: An In-Depth Penetration Testing Study in Evaluating Bluetooth Vulnerabilities and Related Attacks in Smartphones -- Chapter 9: Kadiwa Anyware: A Mobile App Facilitating Produce Exchange Through Blockchain Integration -- Chapter 10: Bluetooth Simulated Reconnaissance Attack Through the use of HCITool: A Case Study. 330 $aThe book consists of peer reviewed and presented papers of the 2nd International Conference on Cloud Computing and Computer Network (CCCN 2024), which took place in Singapore during April 19-21, 2024. The conference is held annually to gather scholars, researchers and engineers working in the field of cloud computing to share their newest research findings and results, discuss and exchange their thoughts and information, and learn about cutting-edge technologies. The papers are solicited on a broad range of topics, including cloud computing and semantic web technologies, cloud computing models, simulations and designs, cloud computing applications, cloud computing services, mobile cloud networking, service-oriented architecture in cloud computing. Case studies and theories in cloud computing are also explored, as well as cloud storage and file systems, Blockchain for emerging networks, network management, measurement and analysis, and network virtualization. Presents papers from the International Conference on Cloud Computing and Computer Network (CCCN 2024) Includes topics such as semantic web technologies, cloud applications, and cloud computing architecture Relevant to academics, researchers, students, and professionals in cloud computing and computer networks. 410 0$aSignals and Communication Technology,$x1860-4870 606 $aComputational intelligence 606 $aTelecommunication 606 $aComputer networks 606 $aComputational Intelligence 606 $aCommunications Engineering, Networks 606 $aComputer Communication Networks 615 0$aComputational intelligence. 615 0$aTelecommunication. 615 0$aComputer networks. 615 14$aComputational Intelligence. 615 24$aCommunications Engineering, Networks. 615 24$aComputer Communication Networks. 676 $a004.6782 700 $aMeng$b Lei$01057907 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983372603321 996 $a2nd International Conference on Cloud Computing and Computer Networks$94316357 997 $aUNINA