6G mobile wireless networks / / Yulei Wu [and seven others], editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (471 pages) |
Disciplina | 621.38456 |
Collana | Computer Communications and Networks |
Soggetto topico |
Mobile communication systems
Radiocommunications mobiles |
ISBN | 3-030-72777-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464440303316 |
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
6G mobile wireless networks / / Yulei Wu [and seven others], editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (471 pages) |
Disciplina | 621.38456 |
Collana | Computer Communications and Networks |
Soggetto topico |
Mobile communication systems
Radiocommunications mobiles |
ISBN | 3-030-72777-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910495232803321 |
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Accountability and privacy in network security / / Yuxiang Ma, Yulei Wu, Jingguo Ge |
Autore | Ma Yuxiang |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XII, 140 p. 62 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer networks Computer security |
ISBN | 981-15-6575-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary. |
Record Nr. | UNINA-9910427715503321 |
Ma Yuxiang
![]() |
||
Cham, Switzerland : , : Springer, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Accountability and privacy in network security / / Yuxiang Ma, Yulei Wu, Jingguo Ge |
Autore | Ma Yuxiang |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XII, 140 p. 62 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer networks Computer security |
ISBN | 981-15-6575-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary. |
Record Nr. | UNISA-996465343603316 |
Ma Yuxiang
![]() |
||
Cham, Switzerland : , : Springer, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
AI and Machine Learning for Network and Security Management |
Autore | Ge Jingguo |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2022 |
Descrizione fisica | 1 online resource (338 pages) |
Altri autori (Persone) |
LiTong
WuYulei |
Collana | IEEE Press Series on Networks and Service Management Ser. |
ISBN |
1-119-83590-9
1-119-83589-5 1-119-83588-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Table of Contents -- Title Page -- Copyright -- Author Biographies -- Preface -- Acknowledgments -- Acronyms -- 1 Introduction -- 1.1 Introduction -- 1.2 Organization of the Book -- 1.3 Conclusion -- References -- 2 When Network and Security Management Meets AI and Machine Learning -- 2.1 Introduction -- 2.2 Architecture of Machine Learning‐Empowered Network and Security Management -- 2.3 Supervised Learning -- 2.4 Semisupervised and Unsupervised Learning -- 2.5 Reinforcement Learning -- 2.6 Industry Products on Network and Security Management -- 2.7 Standards on Network and Security Management -- 2.8 Projects on Network and Security Management -- 2.9 Proof‐of‐Concepts on Network and Security Management -- 2.10 Conclusion -- References -- Notes -- 3 Learning Network Intents for Autonomous Network Management* -- 3.1 Introduction -- 3.2 Motivation -- 3.3 The Hierarchical Representation and Learning Framework for Intention Symbols Inference -- 3.4 Experiments -- 3.5 Conclusion -- References -- Notes -- 4 Virtual Network Embedding via Hierarchical Reinforcement Learning1 -- 4.1 Introduction -- 4.2 Motivation -- 4.3 Preliminaries and Notations -- 4.4 The Framework of VNE‐HRL -- 4.5 Case Study -- 4.6 Related Work -- 4.7 Conclusion -- References -- Note -- 5 Concept Drift Detection for Network Traffic Classification -- 5.1 Related Concepts of Machine Learning in Data Stream Processing -- 5.2 Using an Active Approach to Solve Concept Drift in the Intrusion Detection Field -- 5.3 Concept Drift Detector Based on CVAE -- 5.4 Deployment and Experiment in Real Networks -- 5.5 Future Research Challenges and Open Issues -- 5.6 Conclusion -- References -- Note -- 6 Online Encrypted Traffic Classification Based on Lightweight Neural Networks* -- 6.1 Introduction -- 6.2 Motivation -- 6.3 Preliminaries -- 6.4 The Proposed Lightweight Model.
6.5 Case Study -- 6.6 Related Work -- 6.7 Conclusion -- References -- Notes -- 7 Context‐Aware Learning for Robust Anomaly Detection* -- 7.1 Introduction -- 7.2 Pronouns -- 7.3 The Proposed Method - AllRobust -- 7.4 Experiments -- 7.5 Discussion -- 7.6 Conclusion -- References -- Note -- 8 Anomaly Classification with Unknown, Imbalanced and Few Labeled Log Data -- 8.1 Introduction -- 8.2 Examples -- 8.3 Methodology -- 8.4 Experimental Results and Analysis -- 8.5 Discussion -- 8.6 Conclusion -- References -- Notes -- 9 Zero Trust Networks -- 9.1 Introduction to Zero‐Trust Networks -- 9.2 Zero‐Trust Network Solutions -- 9.3 Machine Learning Powered Zero Trust Networks -- 9.4 Conclusion -- References -- 10 Intelligent Network Management and Operation Systems -- 10.1 Introduction -- 10.2 Traditional Operation and Maintenance Systems -- 10.3 Security Operation and Maintenance -- 10.4 AIOps -- 10.5 Machine Learning‐Based Network Security Monitoring and Management Systems -- 10.6 Conclusion -- References -- 11 Conclusions, and Research Challenges and Open Issues -- 11.1 Conclusions -- 11.2 Research Challenges and Open Issues -- References -- Index -- End User License Agreement. |
Record Nr. | UNINA-9910623986003321 |
Ge Jingguo
![]() |
||
Newark : , : John Wiley & Sons, Incorporated, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXVIII, 849 p. 396 illus.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Software engineering Computer networks Database management Software Engineering Computer Communication Networks Database Management |
ISBN | 3-319-11197-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014 -- 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014 -- 5th International Workshop on Intelligent Communication Networks, IntelNet 2014 -- 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. |
Record Nr. | UNISA-996198261103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXIV, 689 p. 331 illus.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Software engineering Computer networks Database management Software Engineering Computer Communication Networks Database Management |
ISBN | 3-319-11194-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014 -- Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014 -- Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014. |
Record Nr. | UNISA-996198261303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algorithms and Architectures for Parallel Processing : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXVIII, 849 p. 396 illus.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Software engineering Computer networks Database management Software Engineering Computer Communication Networks Database Management |
ISBN | 3-319-11197-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014 -- 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014 -- 5th International Workshop on Intelligent Communication Networks, IntelNet 2014 -- 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. |
Record Nr. | UNINA-9910484427003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Algorithms and Architectures for Parallel Processing : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXIV, 689 p. 331 illus.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Software engineering Computer networks Database management Software Engineering Computer Communication Networks Database Management |
ISBN | 3-319-11194-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014 -- Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014 -- Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014. |
Record Nr. | UNINA-9910484766203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data Technologies and Applications : 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings |
Autore | Tan Zhiyuan |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (198 pages) |
Altri autori (Persone) |
WuYulei
XuMin |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series |
ISBN | 3-031-52265-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Main Track - Regular Papers -- CTL-I: Infrared Few-Shot Learning via Omnidirectional Compatible Class-Incremental -- 1 Introduction -- 2 Related Work -- 2.1 Few Shot Learning -- 2.2 Class Incremental Learning in Infrared Images -- 3 Proposed Method -- 3.1 Preliminary -- 3.2 Model of CTL-I -- 3.3 Virtual Prototypes Assignment with Loss -- 3.4 Compatibility Update -- 4 Experiments -- 4.1 Implementation Details -- 4.2 Benchmark Comparison -- 4.3 Further Analysis -- 5 Conclusion -- References -- Can Federated Models Be Rectified Through Learning Negative Gradients? -- 1 Introduction -- 2 Related Work -- 2.1 Model Poisoning and Defending Mechanisms -- 2.2 Detection of Poisoned Models -- 2.3 Formulation of Machine Unlearning -- 2.4 Unlearning Federated Learning -- 2.5 Challenges to Federated Unlearning -- 3 Methodology -- 3.1 Experimental Data -- 3.2 Network Implementation -- 4 Experimental Results and Discussion -- 4.1 Federated Main Model -- 4.2 Retraining of Federated Main Model -- 5 Conclusion -- References -- BigText-QA: Question Answering over a Large-Scale Hybrid Knowledge Graph -- 1 Introduction -- 2 Background and Related Work -- 3 BigText Knowledge Graph -- 4 BigText Question Answering -- 4.1 Question-Answering Pipeline -- 4.2 Weighting Schemes -- 4.3 Similarities and Thresholds -- 5 Experiments -- 6 Result and Discussion -- 7 Conclusion -- References -- STLGCN: Spatial-Temporal Graph Convolutional Network for Long Term Traffic Forecasting -- 1 Introduction -- 2 Related Work -- 2.1 Graph Convolution -- 2.2 Graph Generation -- 2.3 Traffic Forecasting -- 3 Methods -- 3.1 Preliminary -- 3.2 Framework -- 3.3 Graph Generation Block -- 3.4 Spatial-Temporal Blocks -- 4 Experiments -- 4.1 Datasets -- 4.2 Baseline Algorithms -- 4.3 Experiment Settings -- 4.4 Experimental Results -- 5 Conclusions.
References -- Image Forgery Detection Using Cryptography and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Summary -- 3.2 Image Processing -- 3.3 Hash Generation -- 4 Experimental Design -- 4.1 Deep Learning Experiment -- 5 Results and Discussion -- 5.1 Deep Learning Without Hashing -- 5.2 Deep Learning with Cryptography -- 5.3 Results Evaluation -- 6 Conclusion -- References -- Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminary -- 2.1 Bilinear Groups -- 2.2 Access Structures -- 2.3 Linear Secret Sharing Schemes -- 3 System Model -- 3.1 Security Model -- 4 Our Construction -- 5 Our Construction with CRFs -- 6 Secure Analysis -- 6.1 Proof of RH-CPABE -- 6.2 Proof of RH-CPABE-CRF -- 7 Performance -- 8 Conclusion -- References -- IoT Attacks Countermeasures: Systematic Review and Future Research Direction -- 1 Introduction -- 1.1 Background and Statistics -- 1.2 Computing Survey -- 2 IoT Attack Countermeasures Background -- 2.1 Advantages of IoT Attack Countermeasures -- 2.2 Disadvantages of IoT Attack Countermeasures -- 3 Comparative Systematic Analysis of the Study -- 3.1 Classified by Publication Type -- 3.2 Classified by Publication Year -- 4 IoT Architecture and Its Security Challenges -- 4.1 Perception Layer (PL) -- 4.2 Middle-Ware Layer (ML) -- 4.3 Application Layer (AL) -- 4.4 Network Layer (NL) -- 4.5 Security Challenges and Threat Model -- 5 Countermeasures and Threat Models for Security Attacks in IoT -- 5.1 Novel IoT Attack Countermeasures -- 6 Future Direction, Summary and Conclusion -- 6.1 Conclusion -- References -- A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence -- 1 Introduction -- 2 Literature Search and Bibliometric Network. 2.1 Literature Search -- 2.2 Bibliometric Analysis -- 2.3 Blockchain and Digital Forensic Bibliometric Network -- 3 Systematic Review -- 3.1 Digital Evidence -- 3.2 Chain of Custody -- 3.3 Storage Architectures -- 3.4 Blockchain Technology: Key Principles and Characteristics -- 3.5 Blockchain's Intersection with Digital Forensics -- 3.6 Blockchain in Chain of Custody for Digital Evidence -- 3.7 Existing Frameworks and Methodology -- 3.8 Open-Ended Issues -- 4 Conclusion -- References -- Main Track-Short Paper and PhD Track -- Forest Fire Prediction Using Multi-Source Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Methodology -- 5 Experimentation and Results -- 6 Conclusion -- References -- Research on Preprocessing Process for Improved Image Generation Based on Contrast Enhancement -- 1 Introduction -- 2 Proposed Preprocessing Process -- 2.1 Extract Optimal Values -- 2.2 Generation an Image -- 2.3 Verifying the Quality of the Generated Image -- 3 Conclusion -- References -- An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case -- 1 Introduction -- 1.1 Challenges of Current Evidence Management Processes -- 2 Relevant Technologies -- 2.1 Blockchain and Its Feasibility for Evidence Storage -- 2.2 Evidence Storage Architectures -- 2.3 IPFS -- 2.4 Encryption Methods (Evidence Security and Access Control) -- 3 System Overview -- 3.1 System Requirements -- 3.2 System Design and Case Study -- 4 Conclusions -- References -- SECSOC Workshop -- A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Our Contribution -- 2 Background Overview of Blockchain Technology -- 2.1 Ethereum -- 2.2 Smart Contract -- 3 Non-Fungible Token (NFT) -- 3.1 Protecting Digital Collectibles. 3.2 Boosting Gaming Industry -- 3.3 Tokenised Stock -- 3.4 Protocols -- 3.5 Standards -- 3.6 Desired Properties -- 4 NFT Challenges -- 4.1 Usability Challenges -- 4.2 Slow Confirmation -- 4.3 High Gas-Prices -- 4.4 Data Inaccessibility -- 4.5 Anonymity and Privacy -- 4.6 Governance Consideration -- 4.7 Intellectual Property (IP) Right -- 5 Security Analysis -- 5.1 Cybersecurity -- 5.2 Spoofing -- 5.3 Tampering -- 5.4 Smart Contracts Security -- 5.5 Repudiation -- 5.6 DoS -- 6 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910831008903321 |
Tan Zhiyuan
![]() |
||
Cham : , : Springer International Publishing AG, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|