top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (xvii, 472 pages) : illustrations
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering - Data processing
Data protection
Computational Intelligence
Data Engineering
Data and Information Security
ISBN 3-030-57805-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910863154003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange : Second Conference, BWTAC 2025, Chengdu, China, November 7–9, 2025, Proceedings / / edited by Xiao Song Zhang, Sheng Cao
2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange : Second Conference, BWTAC 2025, Chengdu, China, November 7–9, 2025, Proceedings / / edited by Xiao Song Zhang, Sheng Cao
Autore Zhang Xiao Song
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (800 pages)
Disciplina 005.3
Altri autori (Persone) CaoSheng
Collana Communications in Computer and Information Science
Soggetto topico Application software
Data protection
Blockchains (Databases)
Software engineering
Computer and Information Systems Applications
Data and Information Security
Blockchain
Software Engineering
ISBN 9789819541423
9789819541416
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Protocols, Security, and Smart Contracts. -- Zero-Shot Detection of Bytecode-Level Ponzi Contract Using LLM. -- Smart Contract Vulnerability Detection Using Combined Sequence and Graph Features from Source Code. -- UAVSpectrumChain: Smart-Contract Based Credible Spectrum Trading for UAV Communications. -- Cryptocurrency Network Anomaly Detection Based on Time-Aware Channel Fusion Dynamic Graph Neural Network. -- HSTA: Ethereum Phishing Fraud Detection Model Based on Dynamic Graph Hybrid Spatio-Temporal Attention Mechanism. -- Semantic Interaction and Relation-Decoupled Heterogeneous Graph Structure Learning: Application to Smart Contracts. -- Learning to Detect Smart Contract Vulnerabilities from Code Property Graph. -- SD-ATD: Semantic-Decoupling Contrastive Learning Model for Blockchain Abnormal Transaction Detection. -- BFCSR: a Blockchain-Based Federated Learning Framework with Client Selection and Round-Based Training Scheme. -- A Learning Behavior Based Framework for Secure Personalised Blockchain Federated Learning. -- MultiSCDetect: a Multi-Objective Detection-Based Framework for Smart Contract Vulnerability Detection. -- DDCTGAN: a Dual Discriminator Conditional Tabular Generative Adversarial Network for Network Intrusion Detection Systems. -- TrustZone-Based WebAssembly Smart Contract Execution for Privacy-Preserving Blockchain. -- LogSentry: an LSTM-Based Framework for Real-Time Vulnerability Detection in Smart Contracts. -- PROMISE: Pedersen Commitment-Based Transaction Hiding Scheme for Blockchain System. -- Data, Governance, and Applications. -- Federated Trustworthy Energy Regulation Scheme Based on on-Chain and off-Chain Collaboration. -- Securing the Metaverse: Designing Multi-Layered Accountability Architectures for Web 3.0. -- Understanding Ethereum Money Laundering via Transaction Network Analysis: a Case Study of the Bybit Incident. -- Beformer: Behavior Enhanced Transformer for Task Demand Forecasting in Computing Power Networks. -- Computing Power Networks Load Prediction Based on Trend Segmentation Technology. -- Edge Computing Scheduling by Using Temporal Knowledge Graph. -- Smart Contract Penetrating Supervision Solution for Regional Equity Markets. -- A Distributed and Trusted Collaborative Framework for Industrial Defect Detection Based on Pseudo-Anomaly Augmentation and Residual Segmentation. -- Research and Application of Blockchain Judicial Evidence Preservation in the Correlation Analysis Between Electrical Equipment Failures and Forest Fires. -- BDSN: Blockchain-Based Data Sharing Network. -- Value Representation of Industrial Internet Data Elements Based on Digital Object Architecture. -- Dataset Ownership in the Era of Large Language Models. -- Incentive Mechanisms for Collaborative Intelligence Sharing in Blockchain-Based Federated LLM Fine-Tuning. -- Blockchain Governance and Adaptive Incentive Mechanisms in Federated Learning. -- Scalability, Cross-Chain, and Ecosystems. -- A Survey of Web 3.0 Development: from Technical Architecture to Application Domains and Global-Local Practices. -- Reinforcing Data Security Regulation via Cross-Chain Smart Contracts. -- A Cross-Chain Identity Anonymity Protection Scheme for Regulatory Scenarios. -- The Design and Implementation of an Ethereum Account Fraud Detection Scheme. -- Demystifying Toxic Content in Ethereum Transactions. -- Towards Intelligent Blockchain Consensus Technique: Status and Development. -- Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for VANETs. -- An Anonymous Smart Contract Access Control Scheme Based on Group Signatures. -- An Asynchronous Consensus and Certification Algorithm Based on Parallel Chains. -- DHS-RBAC: a Domain and Hierarchical Data Sharing Scheme for Industrial Internet. -- Heterogeneous-Aware Adaptive Load-Balancing Sharded Blockchain for Financial Data Sharing. -- A Reputation-Enhanced Hashgraph Consensus Mechanism for Internet of Vehicles. -- Blockchain Load Balancing Optimization for Multi-Modal Transactions. -- A Blockchain Based Distributed Code Hosting Platform. -- CIFGViewer: Detecting Cross-Chain Bridge Attacks via Cross-Chain Information Flow Graph.
Record Nr. UNINA-9911047711903321
Zhang Xiao Song  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
5G for Future Wireless Networks : First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings / / edited by Keping Long, Victor C.M. Leung, Haijun Zhang, Zhiyong Feng, Yonghui Li, Zhongshan Zhang
5G for Future Wireless Networks : First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings / / edited by Keping Long, Victor C.M. Leung, Haijun Zhang, Zhiyong Feng, Yonghui Li, Zhongshan Zhang
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVI, 697 p. 319 illus.)
Disciplina 621.3845
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computers, Special purpose
Computer simulation
Artificial intelligence
Data protection
Electronic digital computers - Evaluation
Special Purpose and Application-Based Systems
Computer Modelling
Artificial Intelligence
Data and Information Security
System Performance and Evaluation
ISBN 3-319-72823-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 28GHz MIMO Channel Characteristics Analysis for 5G Communication Systems -- A Caching Strategy Based on User Interest in Content-Centric Network -- Node Localization based on Multiple Radio Transmission -- Power Levels for Wireless Sensor Networks -- End-to-End Transmission Performance Optimization based Routing Selection Algorithm for Software Defined Networking -- Research on video services with QoE perception over future wireless networks -- Tree-LSTM Guided Attention Pooling of DCNN for Semantic Sentence Modeling -- Multi - Base Station Energy Cooperation Based on Nash Q - Learning Algorithm -- Crowdfunding assisted Cellular System Analysis and Application -- A Survey on Security Issues in Big Data of Ubiquitous Network -- Telecom Big Data based User Analysis and Application in Telecom Industry -- Coverage Optimization in Self-Organizing Small Cells -- Expectation Maximization for Multipath Detection in Wideband Signals -- Dynamic Resource Orchestration of Service Function -- Chaining In Network Function Virtualization -- Support Recovery for Multiband Spectrum Sensing Based on Modulated Wideband Converter with SwSOMP Algorithm -- Traffic Scheduling Algorithms for OFDM Based Radio Systems -- Coverage Performance in Cognitive Radio Networks with Self-Sustained Secondary Transmitters -- A Novel Algorithm of UAV-Mounted Base Station Placement and Frequency Allocation -- Throughput Analysis for Full-Duplex Based Device-to-Device Communications -- Joint Mode Selection and Resource Allocation in Underlaying D2D Communication -- PAPR Reduction with Amplitude Clipping and Subband Filter in Filtered-OFDM System -- Throughput Maximization for Two-Hop Decodeand-Forward Relay Channels with Non-Ideal Circuit Power -- Big Data-driven Vehicle Mobility Analysis and Design for 5G -- Complexity Analysis of Massive MIMO Signal Detection Algorithms Based on Factor Graph -- Per-Antenna Maximum Likelihood Detector for Massive MIMO -- Joint User-Association and Resource-Allocation in Virtualized C-RAN -- Adaptive Resource Allocation for Device-to-Device Aided Cellular Systems -- Radio Access Network -- Iterative Receiver with Gaussian and Mean-Field Approximation in Massive MIMO Systems -- Research and Application of Summer High Temperature Prediction Model Based on CART Algorithm -- Research on Peak-to-Average Power Ratio Reduction for FBMC-based 5G Transmission -- A Machine Learning based Engine Error Detection Method -- Beamforming Design for Physical Layer Security and Energy Efficiency Based on Base Station Cooperation.    .
Record Nr. UNINA-9910299313603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
6G Cyber Security Resilience: Trends and Challenges / / edited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna
6G Cyber Security Resilience: Trends and Challenges / / edited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (VIII, 262 p. 60 illus., 54 illus. in color.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Artificial intelligence
Quantum computers
Security systems
Data and Information Security
Artificial Intelligence
Quantum Computing
Security Science and Technology
ISBN 3-031-85008-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis and Comparison of Various Steganography Methods for secure 6G communication -- Image Encryption in the Compressed Domain using Autoencoders for 6G communication -- The Security Design and Challenges of 6G Architecture -- Cyber Security technologies for Privacy in 6G Networks -- Advancements in AI and ML for Enhanced Security and Performance in 6G Networks -- ML-Driven Secure Communication for Next-Generation 6G Networks -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Blockchain and Distributed Ledger Technology for 6G Security -- 6G Cyber Security Resilience: Trends and Challenges -- IoT and Edge Computing Security: Essential Aspects of 6G Networks -- Enhancing Cyber security in 6G Networks with Federated Learning for Collaborative Threat Mitigation -- Federated Learning for Enhancing Cybersecurity in IoT-Integrated 6G Networks: Challenges, Opportunities, and Future Directions.
Record Nr. UNINA-9911007469103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
70 Tips and Tricks for Mastering the CISSP Exam / / by R. Sarma Danturthi
70 Tips and Tricks for Mastering the CISSP Exam / / by R. Sarma Danturthi
Autore Danturthi R. Sarma
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Descrizione fisica 1 online resource (XXII, 357 p. 11 illus.)
Disciplina 005.8
Soggetto topico Data protection
Data and Information Security
ISBN 1-4842-6225-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Security and Risk Management -- Chapter 2. Asset Security -- Chapter 3. Security Engineering -- Chapter 4. Communications and Network Security -- Chapter 5. Identity and Access Management -- Chapter 6. Security Assessment and Testing -- Chapter 7. Security Operations -- Chapter 8. Software Development Security -- Chapter 9: Practice Test.
Record Nr. UNINA-9910427046803321
Danturthi R. Sarma  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Active and Programmable Networks : IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers / / edited by David Hutchison, Spyros Denazis, Laurent Lefevre, Gary J. Minden
Active and Programmable Networks : IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers / / edited by David Hutchison, Spyros Denazis, Laurent Lefevre, Gary J. Minden
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 260 p.)
Disciplina 004.6
Altri autori (Persone) HutchisonDavid <1949->
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer networks
Software engineering
Information storage and retrieval systems
Electronic data processing - Management
Data protection
Application software
Computer Communication Networks
Software Engineering
Information Storage and Retrieval
IT Operations
Data and Information Security
Computer and Information Systems Applications
ISBN 3-642-00972-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Programmable Networks and Heterogeneity -- Validating Inter-domain SLAs with a Programmable Traffic Control System -- Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking -- Towards Effective Portability of Packet Handling Applications across Heterogeneous Hardware Platforms -- Architectural Frameworks -- Architecture for an Active Network Infrastructure Grid – The iSEGrid -- Network Services on Service Extensible Routers -- A Network-Based Response Framework and Implementation -- Towards Resilient Networks Using Programmable Networking Technologies -- Node Architectures -- Towards the Design of an Industrial Autonomic Network Node -- A Web Service- and ForCES-Based Programmable Router Architecture -- An Extension to Packet Filtering of Programmable Networks -- Services -- SAND: A Scalable, Distributed and Dynamic Active Networks Directory Service -- A Programmable Structured Peer-to-Peer Overlay -- Interpreted Active Packets for Ephemeral State Processing Routers -- Short Papers -- A Secure Code Deployment Scheme for Active Networks -- Securing AODV Routing Protocol in Mobile Ad-Hoc Networks -- Extensible Network Configuration and Communication Framework -- A Model for Scalable and Autonomic Network Management -- Intelligibility Evaluation of a VoIP Multi-flow Block Interleaver -- A Web-Services Based Architecture for Dynamic-Service Deployment -- The Active Embedded Ubiquitous Web Service Framework -- Framework of an Application-Aware Adaptation Scheme for Disconnected Operations -- Kinetic Multipoint Relaying: Improvements Using Mobility Predictions -- The Three-Level Approaches for Differentiated Service in Clustering Web Server -- On the Manipulation of JPEG2000, In-Flight, Using Active Components on Next Generation Satellites -- TAON: ATopology-Oriented Active Overlay Network Protocol -- A Biologically Inspired Service Architecture in Ubiquitous Computing Environments.
Record Nr. UNINA-9910483466903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings / / edited by Jun Zheng, Wei Xiang, Pascal Lorenz, Shiwen Mao, Feng Yan
Ad Hoc Networks : 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings / / edited by Jun Zheng, Wei Xiang, Pascal Lorenz, Shiwen Mao, Feng Yan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XI, 304 p. 139 illus., 103 illus. in color.)
Disciplina 004.685
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Artificial intelligence
Data protection
Computer Communication Networks
Artificial Intelligence
Data and Information Security
ISBN 3-030-05888-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Ad Hoc Networks -- Resource Allocation -- Routing and Network Planning -- Localization and Tracking -- Handover, Scheduling, and Action Recognition -- Security -- Miscellaneous Topics in Wireless Networks.
Record Nr. UNINA-9910337561603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings / / edited by Yifeng Zhou, Thomas Kunz
Ad Hoc Networks : 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings / / edited by Yifeng Zhou, Thomas Kunz
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 217 p. 84 illus.)
Disciplina 004.685
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Application software
Telecommunication
Data protection
Computers, Special purpose
Computer simulation
Computer Communication Networks
Computer and Information Systems Applications
Communications Engineering, Networks
Data and Information Security
Special Purpose and Application-Based Systems
Computer Modelling
ISBN 3-319-74439-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band -- The Sound of Communication in Underwater Acoustic Sensor Networks -- Applying Utility Theory to Improve Autonomous Underwater Vehicle Mission Payload Planning and Replanning -- Challenges of Misbehavior Detection in Industrial Wireless Networks -- A New Look at an Old Attack: ARP spoofing to create routing loops in ad hoc networks -- Integrating Intrusion Response Funtionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture -- Source Mobility in Vehicular Named-Data Networking: An Overview -- Flow-level Simulation for Adaptive Routing Protocols in Vehicular Ad-hoc Networks -- Control Overhead Reduction In Cluster-Based VANET Routing Protocol -- Ariel Networks and Routing -- A Hierarchical Framework for Estimating the Performance of an Aerial Network -- An Efficient Routing and Interface Assignment Algorithm for Multi-Channel Multi-Interface (MCMI) Ad Hoc Networks -- Exploiting Multiple Beam Antennas for End-to-End Delay Reduction in Ad Hoc Networks -- Trajectory and Buffer Aware Message Forwarding for Multiple Cooperating UAVs in Message Ferry Networks Cellular Networks, Sensor Networks -- Caching and Computing at the Edge for Mobile -- Augmented Reality and Virtual Reality (AR/VR) in 5G -- Evaluation of a Location Reporting System for mmWave Communication -- Fair Scheduling of Two-Hop Transmission with Energy Harvesting -- EEHCCP: An Energy-Efficient Hybrid Clustering Communication Protocol for Wireless Sensor Network -- A model for self-deployment of autonomous mobile sensor network in an unknown indoor environment.
Record Nr. UNINA-9910299292503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / edited by Yifeng Zhou, Thomas Kunz
Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / edited by Yifeng Zhou, Thomas Kunz
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 416 p. 176 illus.)
Disciplina 004.685
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Data protection
Computers, Special purpose
Computer simulation
Telecommunication
Computer Communication Networks
Data and Information Security
Special Purpose and Application-Based Systems
Computer Modelling
Communications Engineering, Networks
ISBN 3-319-51204-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Management of Surveillance Underwater Acoustic Networks -- Relative Localization for Small Wireless Sensor Networks -- Performance Study of the IEEE 802.15.6 Slotted Aloha Mechanism With Power Control in a Multiuser Environment -- New Selection Strategies of Actor’s Substitute in DARA for Connectivity Restoration in WSANs -- Asymmetric Multi-Way Ranging for Resource-Limited Nodes -- Comparison of RPL Routing Metrics on grids UAV and Vehicular Networks -- Communication and Coordination for Drone Networks 8 Intelligent Wireless AdHoc Routing Protocol and Controller for UAV Networks -- Theoretical Analysis of Obstruction’s influence on Data Dissemination in Vehicular Networks -- Performance Analysis for Traffic-aware Utility in Vehicular Ad Hoc Networks -- Investigation and Adaptation of Signal Propagation Models for a Mixed Outdoor-Indoor Scenario Using a Flying GSM Base Station Modelling and Analysis -- Optimizing Power Allocation in Wireless Networks: Are the Implicit Constraints Really Redundant? -- Towards Dynamic Capacity Management for the Masses -- Distance Distributions in Finite Ad Hoc Networks: Approaches, Applications, and Directions -- Towards More Realistic Network Simulations: Leveraging the System-Call Barrier -- 16 Resource Allocation for Relay-aided Cooperative Hospital Wireless Networks -- Improving the performance of challenged networks with controlled mobility -- SDN Coordination for CCN and FC Content Dissemination -- A Bandwidth Adaptation Scheme for Cloud Radio Access Networks -- Cooperative On-the-Fly Decision Making in Mobility-Controlled Multi Ferry Delay Tolerant Networks -- Multipath Routing Optimization with Interference Consideration in Wireless Ad hoc Network -- An Accurate Passive RFID Indoor Localization System based on SenseaTag and Zoning Algorithm Workshop on practical ad hoc network security and vulnerability -- Communication Links Vulnerability Model for Cyber Security Mitigation -- Entropy-Based Recommendation Trust Model for Machine to Machine Communications -- Reliability, Throughput and Latency Analysis of an Aerial Network -- Gender Assignment for Directional Full-Duplex FDD Nodes in a Multihop Wireless Network -- A Massive MIMO Panel Array at Ka-band with Flexible Patterns and Beam Steering Performance.
Record Nr. UNINA-9910254844103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings / / edited by Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings / / edited by Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XI, 263 p. 110 illus. in color.)
Disciplina 004
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Computers, Special purpose
Data protection
Computer Communication Networks
Special Purpose and Application-Based Systems
Data and Information Security
ISBN 3-319-25067-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Physical layer -- MAC and routing -- mobility in networks -- self-organization, virtualization and localization -- security and fault tolerance.
Record Nr. UNINA-9910299256903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui