top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
6G mobile wireless networks / / Yulei Wu [and seven others], editors
6G mobile wireless networks / / Yulei Wu [and seven others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (471 pages)
Disciplina 621.38456
Collana Computer Communications and Networks
Soggetto topico Mobile communication systems
Radiocommunications mobiles
ISBN 3-030-72777-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464440303316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
6G mobile wireless networks / / Yulei Wu [and seven others], editors
6G mobile wireless networks / / Yulei Wu [and seven others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (471 pages)
Disciplina 621.38456
Collana Computer Communications and Networks
Soggetto topico Mobile communication systems
Radiocommunications mobiles
ISBN 3-030-72777-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910495232803321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Accountability and privacy in network security / / Yuxiang Ma, Yulei Wu, Jingguo Ge
Accountability and privacy in network security / / Yuxiang Ma, Yulei Wu, Jingguo Ge
Autore Ma Yuxiang
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XII, 140 p. 62 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Computer networks
Computer security
ISBN 981-15-6575-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
Record Nr. UNINA-9910427715503321
Ma Yuxiang  
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Accountability and privacy in network security / / Yuxiang Ma, Yulei Wu, Jingguo Ge
Accountability and privacy in network security / / Yuxiang Ma, Yulei Wu, Jingguo Ge
Autore Ma Yuxiang
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XII, 140 p. 62 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Computer networks
Computer security
ISBN 981-15-6575-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
Record Nr. UNISA-996465343603316
Ma Yuxiang  
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
AI and Machine Learning for Network and Security Management
AI and Machine Learning for Network and Security Management
Autore Ge Jingguo
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2022
Descrizione fisica 1 online resource (338 pages)
Altri autori (Persone) LiTong
WuYulei
Collana IEEE Press Series on Networks and Service Management Ser.
ISBN 1-119-83590-9
1-119-83589-5
1-119-83588-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- Title Page -- Copyright -- Author Biographies -- Preface -- Acknowledgments -- Acronyms -- 1 Introduction -- 1.1 Introduction -- 1.2 Organization of the Book -- 1.3 Conclusion -- References -- 2 When Network and Security Management Meets AI and Machine Learning -- 2.1 Introduction -- 2.2 Architecture of Machine Learning‐Empowered Network and Security Management -- 2.3 Supervised Learning -- 2.4 Semisupervised and Unsupervised Learning -- 2.5 Reinforcement Learning -- 2.6 Industry Products on Network and Security Management -- 2.7 Standards on Network and Security Management -- 2.8 Projects on Network and Security Management -- 2.9 Proof‐of‐Concepts on Network and Security Management -- 2.10 Conclusion -- References -- Notes -- 3 Learning Network Intents for Autonomous Network Management* -- 3.1 Introduction -- 3.2 Motivation -- 3.3 The Hierarchical Representation and Learning Framework for Intention Symbols Inference -- 3.4 Experiments -- 3.5 Conclusion -- References -- Notes -- 4 Virtual Network Embedding via Hierarchical Reinforcement Learning1 -- 4.1 Introduction -- 4.2 Motivation -- 4.3 Preliminaries and Notations -- 4.4 The Framework of VNE‐HRL -- 4.5 Case Study -- 4.6 Related Work -- 4.7 Conclusion -- References -- Note -- 5 Concept Drift Detection for Network Traffic Classification -- 5.1 Related Concepts of Machine Learning in Data Stream Processing -- 5.2 Using an Active Approach to Solve Concept Drift in the Intrusion Detection Field -- 5.3 Concept Drift Detector Based on CVAE -- 5.4 Deployment and Experiment in Real Networks -- 5.5 Future Research Challenges and Open Issues -- 5.6 Conclusion -- References -- Note -- 6 Online Encrypted Traffic Classification Based on Lightweight Neural Networks* -- 6.1 Introduction -- 6.2 Motivation -- 6.3 Preliminaries -- 6.4 The Proposed Lightweight Model.
6.5 Case Study -- 6.6 Related Work -- 6.7 Conclusion -- References -- Notes -- 7 Context‐Aware Learning for Robust Anomaly Detection* -- 7.1 Introduction -- 7.2 Pronouns -- 7.3 The Proposed Method - AllRobust -- 7.4 Experiments -- 7.5 Discussion -- 7.6 Conclusion -- References -- Note -- 8 Anomaly Classification with Unknown, Imbalanced and Few Labeled Log Data -- 8.1 Introduction -- 8.2 Examples -- 8.3 Methodology -- 8.4 Experimental Results and Analysis -- 8.5 Discussion -- 8.6 Conclusion -- References -- Notes -- 9 Zero Trust Networks -- 9.1 Introduction to Zero‐Trust Networks -- 9.2 Zero‐Trust Network Solutions -- 9.3 Machine Learning Powered Zero Trust Networks -- 9.4 Conclusion -- References -- 10 Intelligent Network Management and Operation Systems -- 10.1 Introduction -- 10.2 Traditional Operation and Maintenance Systems -- 10.3 Security Operation and Maintenance -- 10.4 AIOps -- 10.5 Machine Learning‐Based Network Security Monitoring and Management Systems -- 10.6 Conclusion -- References -- 11 Conclusions, and Research Challenges and Open Issues -- 11.1 Conclusions -- 11.2 Research Challenges and Open Issues -- References -- Index -- End User License Agreement.
Record Nr. UNINA-9910623986003321
Ge Jingguo  
Newark : , : John Wiley & Sons, Incorporated, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXVIII, 849 p. 396 illus.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Software engineering
Computer networks
Database management
Software Engineering
Computer Communication Networks
Database Management
ISBN 3-319-11197-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014 -- 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014 -- 5th International Workshop on Intelligent Communication Networks, IntelNet 2014 -- 5th International Workshop on Wireless Networks and Multimedia, WNM 2014.
Record Nr. UNISA-996198261103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXIV, 689 p. 331 illus.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Software engineering
Computer networks
Database management
Software Engineering
Computer Communication Networks
Database Management
ISBN 3-319-11194-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014 -- Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014 -- Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.
Record Nr. UNISA-996198261303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu
Algorithms and Architectures for Parallel Processing : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXVIII, 849 p. 396 illus.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Software engineering
Computer networks
Database management
Software Engineering
Computer Communication Networks
Database Management
ISBN 3-319-11197-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014 -- 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014 -- 5th International Workshop on Intelligent Communication Networks, IntelNet 2014 -- 5th International Workshop on Wireless Networks and Multimedia, WNM 2014.
Record Nr. UNINA-9910484427003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu
Algorithms and Architectures for Parallel Processing : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II / / edited by Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei Liu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXIV, 689 p. 331 illus.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Software engineering
Computer networks
Database management
Software Engineering
Computer Communication Networks
Database Management
ISBN 3-319-11194-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014 -- Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014 -- Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.
Record Nr. UNINA-9910484766203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data Technologies and Applications : 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings
Big Data Technologies and Applications : 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings
Autore Tan Zhiyuan
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (198 pages)
Altri autori (Persone) WuYulei
XuMin
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series
ISBN 3-031-52265-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Main Track - Regular Papers -- CTL-I: Infrared Few-Shot Learning via Omnidirectional Compatible Class-Incremental -- 1 Introduction -- 2 Related Work -- 2.1 Few Shot Learning -- 2.2 Class Incremental Learning in Infrared Images -- 3 Proposed Method -- 3.1 Preliminary -- 3.2 Model of CTL-I -- 3.3 Virtual Prototypes Assignment with Loss -- 3.4 Compatibility Update -- 4 Experiments -- 4.1 Implementation Details -- 4.2 Benchmark Comparison -- 4.3 Further Analysis -- 5 Conclusion -- References -- Can Federated Models Be Rectified Through Learning Negative Gradients? -- 1 Introduction -- 2 Related Work -- 2.1 Model Poisoning and Defending Mechanisms -- 2.2 Detection of Poisoned Models -- 2.3 Formulation of Machine Unlearning -- 2.4 Unlearning Federated Learning -- 2.5 Challenges to Federated Unlearning -- 3 Methodology -- 3.1 Experimental Data -- 3.2 Network Implementation -- 4 Experimental Results and Discussion -- 4.1 Federated Main Model -- 4.2 Retraining of Federated Main Model -- 5 Conclusion -- References -- BigText-QA: Question Answering over a Large-Scale Hybrid Knowledge Graph -- 1 Introduction -- 2 Background and Related Work -- 3 BigText Knowledge Graph -- 4 BigText Question Answering -- 4.1 Question-Answering Pipeline -- 4.2 Weighting Schemes -- 4.3 Similarities and Thresholds -- 5 Experiments -- 6 Result and Discussion -- 7 Conclusion -- References -- STLGCN: Spatial-Temporal Graph Convolutional Network for Long Term Traffic Forecasting -- 1 Introduction -- 2 Related Work -- 2.1 Graph Convolution -- 2.2 Graph Generation -- 2.3 Traffic Forecasting -- 3 Methods -- 3.1 Preliminary -- 3.2 Framework -- 3.3 Graph Generation Block -- 3.4 Spatial-Temporal Blocks -- 4 Experiments -- 4.1 Datasets -- 4.2 Baseline Algorithms -- 4.3 Experiment Settings -- 4.4 Experimental Results -- 5 Conclusions.
References -- Image Forgery Detection Using Cryptography and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Summary -- 3.2 Image Processing -- 3.3 Hash Generation -- 4 Experimental Design -- 4.1 Deep Learning Experiment -- 5 Results and Discussion -- 5.1 Deep Learning Without Hashing -- 5.2 Deep Learning with Cryptography -- 5.3 Results Evaluation -- 6 Conclusion -- References -- Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminary -- 2.1 Bilinear Groups -- 2.2 Access Structures -- 2.3 Linear Secret Sharing Schemes -- 3 System Model -- 3.1 Security Model -- 4 Our Construction -- 5 Our Construction with CRFs -- 6 Secure Analysis -- 6.1 Proof of RH-CPABE -- 6.2 Proof of RH-CPABE-CRF -- 7 Performance -- 8 Conclusion -- References -- IoT Attacks Countermeasures: Systematic Review and Future Research Direction -- 1 Introduction -- 1.1 Background and Statistics -- 1.2 Computing Survey -- 2 IoT Attack Countermeasures Background -- 2.1 Advantages of IoT Attack Countermeasures -- 2.2 Disadvantages of IoT Attack Countermeasures -- 3 Comparative Systematic Analysis of the Study -- 3.1 Classified by Publication Type -- 3.2 Classified by Publication Year -- 4 IoT Architecture and Its Security Challenges -- 4.1 Perception Layer (PL) -- 4.2 Middle-Ware Layer (ML) -- 4.3 Application Layer (AL) -- 4.4 Network Layer (NL) -- 4.5 Security Challenges and Threat Model -- 5 Countermeasures and Threat Models for Security Attacks in IoT -- 5.1 Novel IoT Attack Countermeasures -- 6 Future Direction, Summary and Conclusion -- 6.1 Conclusion -- References -- A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence -- 1 Introduction -- 2 Literature Search and Bibliometric Network.
2.1 Literature Search -- 2.2 Bibliometric Analysis -- 2.3 Blockchain and Digital Forensic Bibliometric Network -- 3 Systematic Review -- 3.1 Digital Evidence -- 3.2 Chain of Custody -- 3.3 Storage Architectures -- 3.4 Blockchain Technology: Key Principles and Characteristics -- 3.5 Blockchain's Intersection with Digital Forensics -- 3.6 Blockchain in Chain of Custody for Digital Evidence -- 3.7 Existing Frameworks and Methodology -- 3.8 Open-Ended Issues -- 4 Conclusion -- References -- Main Track-Short Paper and PhD Track -- Forest Fire Prediction Using Multi-Source Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Methodology -- 5 Experimentation and Results -- 6 Conclusion -- References -- Research on Preprocessing Process for Improved Image Generation Based on Contrast Enhancement -- 1 Introduction -- 2 Proposed Preprocessing Process -- 2.1 Extract Optimal Values -- 2.2 Generation an Image -- 2.3 Verifying the Quality of the Generated Image -- 3 Conclusion -- References -- An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case -- 1 Introduction -- 1.1 Challenges of Current Evidence Management Processes -- 2 Relevant Technologies -- 2.1 Blockchain and Its Feasibility for Evidence Storage -- 2.2 Evidence Storage Architectures -- 2.3 IPFS -- 2.4 Encryption Methods (Evidence Security and Access Control) -- 3 System Overview -- 3.1 System Requirements -- 3.2 System Design and Case Study -- 4 Conclusions -- References -- SECSOC Workshop -- A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Our Contribution -- 2 Background Overview of Blockchain Technology -- 2.1 Ethereum -- 2.2 Smart Contract -- 3 Non-Fungible Token (NFT) -- 3.1 Protecting Digital Collectibles.
3.2 Boosting Gaming Industry -- 3.3 Tokenised Stock -- 3.4 Protocols -- 3.5 Standards -- 3.6 Desired Properties -- 4 NFT Challenges -- 4.1 Usability Challenges -- 4.2 Slow Confirmation -- 4.3 High Gas-Prices -- 4.4 Data Inaccessibility -- 4.5 Anonymity and Privacy -- 4.6 Governance Consideration -- 4.7 Intellectual Property (IP) Right -- 5 Security Analysis -- 5.1 Cybersecurity -- 5.2 Spoofing -- 5.3 Tampering -- 5.4 Smart Contracts Security -- 5.5 Repudiation -- 5.6 DoS -- 6 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910831008903321
Tan Zhiyuan  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui