Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 366 p. 168 illus.) |
Disciplina | 005.82 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer communication systems
Computer security Data encryption (Computer science) Algorithms Computer Communication Networks Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 3-642-36958-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Substitution Networks: Performance Collapse Due to Overhead in Communication Times -- Handheld Analyzer of IEEE 802.15.4 PHY and MAC Frames -- Distributed Medium Access Control with Dynamic Altruism -- Providing Throughput Guarantees in IEEE 802.11 Wireless Networks -- Node Discovery and Replacement Using Mobile Robot -- Dynamic Tracking of Composite Events in Wireless Sensor Networks -- Localization in Wireless Sensor Networks by Cross Entropy Method -- Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks -- Asynchronous Rendezvous Protocol for Cognitive Radio Ad Hoc Networks -- DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks -- A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs -- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks -- Cross-Layer Interception Caching for MANETs -- Below Cross-Layer: An Alternative Approach to Service Discovery -- Modeling the Spontaneous Reaction of Mammalian Cells to External Stimuli -- Substitution Networks Based on Software Defined Networking -- A Modular Architecture for Reconfigurable Heterogeneous Networks -- Design Challenges and Solutions for Multi-channel Communications in Vehicular Ad Hoc NETworks -- Movement Speed Based Inter-probe Times for Neighbour Discovery. . |
Record Nr. | UNINA-9910437573203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Ad-hoc, Mobile, and Wireless Networks [[electronic resource] ] : 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings / / edited by Nicolas Montavont, Georgios Z. Papadopoulos |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 346 p. 148 illus.) |
Disciplina | 621.382 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Special purpose computers Computer system failures Computer security Computer Communication Networks Special Purpose and Application-Based Systems System Performance and Evaluation Systems and Data Security |
ISBN | 3-030-00247-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Routing in Low Power Networks -- 5G and mmWave -- Low Power Wide Area Networks -- Mobile Communications and Networks -- Distributed Systems and Architectures -- Testbeds and Real-World Deployments. |
Record Nr. | UNISA-996466350503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Ad-hoc, Mobile, and Wireless Networks : 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings / / edited by Nicolas Montavont, Georgios Z. Papadopoulos |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 346 p. 148 illus.) |
Disciplina |
621.382
621.3845 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Special purpose computers Computer system failures Computer security Computer Communication Networks Special Purpose and Application-Based Systems System Performance and Evaluation Systems and Data Security |
ISBN | 3-030-00247-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Routing in Low Power Networks -- 5G and mmWave -- Low Power Wide Area Networks -- Mobile Communications and Networks -- Distributed Systems and Architectures -- Testbeds and Real-World Deployments. |
Record Nr. | UNINA-9910349407903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Ad-hoc, Mobile, and Wireless Networks [[electronic resource] ] : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings / / edited by Antonio Puliafito, Dario Bruneo, Salvatore Distefano, Francesco Longo |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 396 p. 163 illus.) |
Disciplina | 004.685 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computers Special purpose computers Computer security Data structures (Computer science) Electrical engineering Computer Communication Networks Information Systems and Communication Service Special Purpose and Application-Based Systems Systems and Data Security Data Structures and Information Theory Communications Engineering, Networks |
ISBN | 3-319-67910-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Internet of Things -- SustainaBLE: a Power-Aware Algorithm for Greener Industrial IoT Networks -- The 3D redeployment of nodes in Wireless Sensor Networks with real testbed prototyping -- Semantic Resource Management of Federated IoT Testbeds -- Targeted Content Delivery to IoT Devices Using Bloom Filters -- Security -- Trust Based Monitoring Approach for Mobile Ad Hoc Networks -- An Implementation and Evaluation of the Security Features of RPL -- A ticket-based Authentication Scheme for VANETs preserving Privacy -- A Trust based Communication Scheme for Safety Messages Exchange in VANETs -- Smart City -- Mobility as the main enabler of opportunistic data dissemination in urban scenarios -- Analysis and classification of the vehicular traffic distribution in an urban area -- User-space network tunneling under a mobile platform: a case study for Android environments -- Mobile Crowd Sensing as an Enabler for People as a Service Mobile Computing -- Ad-hoc networks -- SVM- MUSIC Algorithm for Spectrum Sensing in Cognitive Radio Ad-Hoc Networks -- Optimization of a modular ad hoc land wireless system via distributed joint Source-Network Coding for correlated sensors -- AdhocInfra Toggle: Opportunistic Auto-configuration of Wireless Interface for Maintaining Data Sessions in WiFi Networks -- Simulation of AdHoc Networks Including Clustering and Mobility -- Implementations and validations -- Highlighting Some Shortcomings of the CoCoA+ Congestion Control Algorithm -- Experimental Evaluation of Non-Coherent MIMO Grassmannian Signaling Schemes.-WEVA: A Complete Solution for Industrial Internet of Things -- Validating Contact Times Extracted from Mobility Traces -- Wireless sensor networks. -Optimising Wireless Sensor Network Link Quality through Power Control with non-Convex Utilities using Game Theory -- Routing protocol enhancement for mobility support in wireless sensor networks -- Correlation-Free MultiPath Routing for Multimedia traffic in Wireless Sensor Networks -- Impact of Simulation Environment in Performance Evaluation of Protocols for WSNs. -Data management -- A Real-Time Query Processing System for WSN -- Centralized and distributed architectures: Approximation of the response time in a video surveillance system of road traffic by logarithm, power and linear functions -- Secure Storage as a Service in Multi-Cloud Environment -- Policy Management and Enforcement Using OWL and SWRL for the Internet of Things -- Wireless systems -- BSSACH: A Big Slot Scheduling Algorithms with Channel Hopping for Dynamic Wireless Sensor Networks -- A hybrid ant-genetic algorithm to solve a real deployment problem: a case study with experimental validation -- Interference Analysis of Nonlinear and Asynchronous OFDM in Multiuser Cognitive Radio Networks. |
Record Nr. | UNISA-996465550603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Ad-hoc, Mobile, and Wireless Networks : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings / / edited by Antonio Puliafito, Dario Bruneo, Salvatore Distefano, Francesco Longo |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 396 p. 163 illus.) |
Disciplina | 004.685 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computers Special purpose computers Computer security Data structures (Computer science) Electrical engineering Computer Communication Networks Information Systems and Communication Service Special Purpose and Application-Based Systems Systems and Data Security Data Structures and Information Theory Communications Engineering, Networks |
ISBN | 3-319-67910-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Internet of Things -- SustainaBLE: a Power-Aware Algorithm for Greener Industrial IoT Networks -- The 3D redeployment of nodes in Wireless Sensor Networks with real testbed prototyping -- Semantic Resource Management of Federated IoT Testbeds -- Targeted Content Delivery to IoT Devices Using Bloom Filters -- Security -- Trust Based Monitoring Approach for Mobile Ad Hoc Networks -- An Implementation and Evaluation of the Security Features of RPL -- A ticket-based Authentication Scheme for VANETs preserving Privacy -- A Trust based Communication Scheme for Safety Messages Exchange in VANETs -- Smart City -- Mobility as the main enabler of opportunistic data dissemination in urban scenarios -- Analysis and classification of the vehicular traffic distribution in an urban area -- User-space network tunneling under a mobile platform: a case study for Android environments -- Mobile Crowd Sensing as an Enabler for People as a Service Mobile Computing -- Ad-hoc networks -- SVM- MUSIC Algorithm for Spectrum Sensing in Cognitive Radio Ad-Hoc Networks -- Optimization of a modular ad hoc land wireless system via distributed joint Source-Network Coding for correlated sensors -- AdhocInfra Toggle: Opportunistic Auto-configuration of Wireless Interface for Maintaining Data Sessions in WiFi Networks -- Simulation of AdHoc Networks Including Clustering and Mobility -- Implementations and validations -- Highlighting Some Shortcomings of the CoCoA+ Congestion Control Algorithm -- Experimental Evaluation of Non-Coherent MIMO Grassmannian Signaling Schemes.-WEVA: A Complete Solution for Industrial Internet of Things -- Validating Contact Times Extracted from Mobility Traces -- Wireless sensor networks. -Optimising Wireless Sensor Network Link Quality through Power Control with non-Convex Utilities using Game Theory -- Routing protocol enhancement for mobility support in wireless sensor networks -- Correlation-Free MultiPath Routing for Multimedia traffic in Wireless Sensor Networks -- Impact of Simulation Environment in Performance Evaluation of Protocols for WSNs. -Data management -- A Real-Time Query Processing System for WSN -- Centralized and distributed architectures: Approximation of the response time in a video surveillance system of road traffic by logarithm, power and linear functions -- Secure Storage as a Service in Multi-Cloud Environment -- Policy Management and Enforcement Using OWL and SWRL for the Internet of Things -- Wireless systems -- BSSACH: A Big Slot Scheduling Algorithms with Channel Hopping for Dynamic Wireless Sensor Networks -- A hybrid ant-genetic algorithm to solve a real deployment problem: a case study with experimental validation -- Interference Analysis of Nonlinear and Asynchronous OFDM in Multiuser Cognitive Radio Networks. |
Record Nr. | UNINA-9910484342203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Ad-hoc, Mobile, and Wireless Networks [[electronic resource] ] : 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings / / edited by Nathalie Mitton, Valeria Loscri, Alexandre Mouradian |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIII, 356 p. 141 illus.) |
Disciplina | 621.382 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Application software Electrical engineering Computer security Computer Communication Networks Information Systems Applications (incl. Internet) Communications Engineering, Networks Systems and Data Security |
ISBN | 3-319-40509-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Resource Allocation -- Theory and Communications -- PHY/MAC/Routing in Sensors/IoT -- DTN/Opportunistic Networks -- Sensors/IoT -- Security -- VANET and ITS -- Robots and MANETs. |
Record Nr. | UNISA-996466004903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Ad-hoc, Mobile, and Wireless Networks : 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings / / edited by Nathalie Mitton, Valeria Loscri, Alexandre Mouradian |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIII, 356 p. 141 illus.) |
Disciplina | 621.382 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Application software Electrical engineering Computer security Computer Communication Networks Information Systems Applications (incl. Internet) Communications Engineering, Networks Systems and Data Security |
ISBN | 3-319-40509-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Resource Allocation -- Theory and Communications -- PHY/MAC/Routing in Sensors/IoT -- DTN/Opportunistic Networks -- Sensors/IoT -- Security -- VANET and ITS -- Robots and MANETs. |
Record Nr. | UNINA-9910484695303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNISA-996465351503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNINA-9910380755503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced API Security [[electronic resource] ] : OAuth 2.0 and Beyond / / by Prabath Siriwardena |
Autore | Siriwardena Prabath |
Edizione | [2nd ed. 2020.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020 |
Descrizione fisica | 1 online resource (xix, 449 pages) : illustrations |
Disciplina | 005.1068 |
Collana | Books for professionals by professionals |
Soggetto topico |
Data protection
Special purpose computers Computer security Programming languages (Electronic computers) Security Special Purpose and Application-Based Systems Systems and Data Security Programming Languages, Compilers, Interpreters |
ISBN | 1-4842-2050-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. APIs Rule!.-2. Designing Security for APIs.-3. Securing APIs with Transport Layer Security (TLS).-4. OAuth 2.0 Fundamentals.-5. Edge Security with an API Gateway.-6. OpenID Connect (OIDC).-7. Message Level Security with JSON Web Signature.-8. Message Level Security with JSON Web Encryption.-9. OAuth 2.0 Profiles.-10. Accessing APIs via Native Mobile Apps.-11. OAuth 2.0 Token Binding.-12. Federating Access to APIs.-13. User Managed Access.-14. OAuth 2.0 Security -- 15. Patterns and Practices -- 16: A. The Evolution of Identity Delegation -- 17: B. OAuth 1.0 -- 18: C. How Transport Layer Security Works -- 19: D. UMA Evolution -- 20: E. Base64URL Encoding -- 21: F. Basic/Digest Authentication -- 22: G. OAuth 2.0 MAC Token Profile. |
Record Nr. | UNINA-9910369901303321 |
Siriwardena Prabath
![]() |
||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|