13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
| 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (xvii, 472 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Data protection Computational Intelligence Data Engineering Data and Information Security |
| ISBN | 3-030-57805-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910863154003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange : Second Conference, BWTAC 2025, Chengdu, China, November 7–9, 2025, Proceedings / / edited by Xiao Song Zhang, Sheng Cao
| 2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange : Second Conference, BWTAC 2025, Chengdu, China, November 7–9, 2025, Proceedings / / edited by Xiao Song Zhang, Sheng Cao |
| Autore | Zhang Xiao Song |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (800 pages) |
| Disciplina | 005.3 |
| Altri autori (Persone) | CaoSheng |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Application software
Data protection Blockchains (Databases) Software engineering Computer and Information Systems Applications Data and Information Security Blockchain Software Engineering |
| ISBN |
9789819541423
9789819541416 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Protocols, Security, and Smart Contracts. -- Zero-Shot Detection of Bytecode-Level Ponzi Contract Using LLM. -- Smart Contract Vulnerability Detection Using Combined Sequence and Graph Features from Source Code. -- UAVSpectrumChain: Smart-Contract Based Credible Spectrum Trading for UAV Communications. -- Cryptocurrency Network Anomaly Detection Based on Time-Aware Channel Fusion Dynamic Graph Neural Network. -- HSTA: Ethereum Phishing Fraud Detection Model Based on Dynamic Graph Hybrid Spatio-Temporal Attention Mechanism. -- Semantic Interaction and Relation-Decoupled Heterogeneous Graph Structure Learning: Application to Smart Contracts. -- Learning to Detect Smart Contract Vulnerabilities from Code Property Graph. -- SD-ATD: Semantic-Decoupling Contrastive Learning Model for Blockchain Abnormal Transaction Detection. -- BFCSR: a Blockchain-Based Federated Learning Framework with Client Selection and Round-Based Training Scheme. -- A Learning Behavior Based Framework for Secure Personalised Blockchain Federated Learning. -- MultiSCDetect: a Multi-Objective Detection-Based Framework for Smart Contract Vulnerability Detection. -- DDCTGAN: a Dual Discriminator Conditional Tabular Generative Adversarial Network for Network Intrusion Detection Systems. -- TrustZone-Based WebAssembly Smart Contract Execution for Privacy-Preserving Blockchain. -- LogSentry: an LSTM-Based Framework for Real-Time Vulnerability Detection in Smart Contracts. -- PROMISE: Pedersen Commitment-Based Transaction Hiding Scheme for Blockchain System. -- Data, Governance, and Applications. -- Federated Trustworthy Energy Regulation Scheme Based on on-Chain and off-Chain Collaboration. -- Securing the Metaverse: Designing Multi-Layered Accountability Architectures for Web 3.0. -- Understanding Ethereum Money Laundering via Transaction Network Analysis: a Case Study of the Bybit Incident. -- Beformer: Behavior Enhanced Transformer for Task Demand Forecasting in Computing Power Networks. -- Computing Power Networks Load Prediction Based on Trend Segmentation Technology. -- Edge Computing Scheduling by Using Temporal Knowledge Graph. -- Smart Contract Penetrating Supervision Solution for Regional Equity Markets. -- A Distributed and Trusted Collaborative Framework for Industrial Defect Detection Based on Pseudo-Anomaly Augmentation and Residual Segmentation. -- Research and Application of Blockchain Judicial Evidence Preservation in the Correlation Analysis Between Electrical Equipment Failures and Forest Fires. -- BDSN: Blockchain-Based Data Sharing Network. -- Value Representation of Industrial Internet Data Elements Based on Digital Object Architecture. -- Dataset Ownership in the Era of Large Language Models. -- Incentive Mechanisms for Collaborative Intelligence Sharing in Blockchain-Based Federated LLM Fine-Tuning. -- Blockchain Governance and Adaptive Incentive Mechanisms in Federated Learning. -- Scalability, Cross-Chain, and Ecosystems. -- A Survey of Web 3.0 Development: from Technical Architecture to Application Domains and Global-Local Practices. -- Reinforcing Data Security Regulation via Cross-Chain Smart Contracts. -- A Cross-Chain Identity Anonymity Protection Scheme for Regulatory Scenarios. -- The Design and Implementation of an Ethereum Account Fraud Detection Scheme. -- Demystifying Toxic Content in Ethereum Transactions. -- Towards Intelligent Blockchain Consensus Technique: Status and Development. -- Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for VANETs. -- An Anonymous Smart Contract Access Control Scheme Based on Group Signatures. -- An Asynchronous Consensus and Certification Algorithm Based on Parallel Chains. -- DHS-RBAC: a Domain and Hierarchical Data Sharing Scheme for Industrial Internet. -- Heterogeneous-Aware Adaptive Load-Balancing Sharded Blockchain for Financial Data Sharing. -- A Reputation-Enhanced Hashgraph Consensus Mechanism for Internet of Vehicles. -- Blockchain Load Balancing Optimization for Multi-Modal Transactions. -- A Blockchain Based Distributed Code Hosting Platform. -- CIFGViewer: Detecting Cross-Chain Bridge Attacks via Cross-Chain Information Flow Graph. |
| Record Nr. | UNINA-9911047711903321 |
Zhang Xiao Song
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
5G for Future Wireless Networks : First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings / / edited by Keping Long, Victor C.M. Leung, Haijun Zhang, Zhiyong Feng, Yonghui Li, Zhongshan Zhang
| 5G for Future Wireless Networks : First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings / / edited by Keping Long, Victor C.M. Leung, Haijun Zhang, Zhiyong Feng, Yonghui Li, Zhongshan Zhang |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XVI, 697 p. 319 illus.) |
| Disciplina | 621.3845 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computers, Special purpose
Computer simulation Artificial intelligence Data protection Electronic digital computers - Evaluation Special Purpose and Application-Based Systems Computer Modelling Artificial Intelligence Data and Information Security System Performance and Evaluation |
| ISBN | 3-319-72823-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 28GHz MIMO Channel Characteristics Analysis for 5G Communication Systems -- A Caching Strategy Based on User Interest in Content-Centric Network -- Node Localization based on Multiple Radio Transmission -- Power Levels for Wireless Sensor Networks -- End-to-End Transmission Performance Optimization based Routing Selection Algorithm for Software Defined Networking -- Research on video services with QoE perception over future wireless networks -- Tree-LSTM Guided Attention Pooling of DCNN for Semantic Sentence Modeling -- Multi - Base Station Energy Cooperation Based on Nash Q - Learning Algorithm -- Crowdfunding assisted Cellular System Analysis and Application -- A Survey on Security Issues in Big Data of Ubiquitous Network -- Telecom Big Data based User Analysis and Application in Telecom Industry -- Coverage Optimization in Self-Organizing Small Cells -- Expectation Maximization for Multipath Detection in Wideband Signals -- Dynamic Resource Orchestration of Service Function -- Chaining In Network Function Virtualization -- Support Recovery for Multiband Spectrum Sensing Based on Modulated Wideband Converter with SwSOMP Algorithm -- Traffic Scheduling Algorithms for OFDM Based Radio Systems -- Coverage Performance in Cognitive Radio Networks with Self-Sustained Secondary Transmitters -- A Novel Algorithm of UAV-Mounted Base Station Placement and Frequency Allocation -- Throughput Analysis for Full-Duplex Based Device-to-Device Communications -- Joint Mode Selection and Resource Allocation in Underlaying D2D Communication -- PAPR Reduction with Amplitude Clipping and Subband Filter in Filtered-OFDM System -- Throughput Maximization for Two-Hop Decodeand-Forward Relay Channels with Non-Ideal Circuit Power -- Big Data-driven Vehicle Mobility Analysis and Design for 5G -- Complexity Analysis of Massive MIMO Signal Detection Algorithms Based on Factor Graph -- Per-Antenna Maximum Likelihood Detector for Massive MIMO -- Joint User-Association and Resource-Allocation in Virtualized C-RAN -- Adaptive Resource Allocation for Device-to-Device Aided Cellular Systems -- Radio Access Network -- Iterative Receiver with Gaussian and Mean-Field Approximation in Massive MIMO Systems -- Research and Application of Summer High Temperature Prediction Model Based on CART Algorithm -- Research on Peak-to-Average Power Ratio Reduction for FBMC-based 5G Transmission -- A Machine Learning based Engine Error Detection Method -- Beamforming Design for Physical Layer Security and Energy Efficiency Based on Base Station Cooperation. . |
| Record Nr. | UNINA-9910299313603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
6G Cyber Security Resilience: Trends and Challenges / / edited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna
| 6G Cyber Security Resilience: Trends and Challenges / / edited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (VIII, 262 p. 60 illus., 54 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Advanced Sciences and Technologies for Security Applications |
| Soggetto topico |
Data protection
Artificial intelligence Quantum computers Security systems Data and Information Security Artificial Intelligence Quantum Computing Security Science and Technology |
| ISBN | 3-031-85008-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Analysis and Comparison of Various Steganography Methods for secure 6G communication -- Image Encryption in the Compressed Domain using Autoencoders for 6G communication -- The Security Design and Challenges of 6G Architecture -- Cyber Security technologies for Privacy in 6G Networks -- Advancements in AI and ML for Enhanced Security and Performance in 6G Networks -- ML-Driven Secure Communication for Next-Generation 6G Networks -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Blockchain and Distributed Ledger Technology for 6G Security -- 6G Cyber Security Resilience: Trends and Challenges -- IoT and Edge Computing Security: Essential Aspects of 6G Networks -- Enhancing Cyber security in 6G Networks with Federated Learning for Collaborative Threat Mitigation -- Federated Learning for Enhancing Cybersecurity in IoT-Integrated 6G Networks: Challenges, Opportunities, and Future Directions. |
| Record Nr. | UNINA-9911007469103321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
70 Tips and Tricks for Mastering the CISSP Exam / / by R. Sarma Danturthi
| 70 Tips and Tricks for Mastering the CISSP Exam / / by R. Sarma Danturthi |
| Autore | Danturthi R. Sarma |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020 |
| Descrizione fisica | 1 online resource (XXII, 357 p. 11 illus.) |
| Disciplina | 005.8 |
| Soggetto topico |
Data protection
Data and Information Security |
| ISBN | 1-4842-6225-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Security and Risk Management -- Chapter 2. Asset Security -- Chapter 3. Security Engineering -- Chapter 4. Communications and Network Security -- Chapter 5. Identity and Access Management -- Chapter 6. Security Assessment and Testing -- Chapter 7. Security Operations -- Chapter 8. Software Development Security -- Chapter 9: Practice Test. |
| Record Nr. | UNINA-9910427046803321 |
Danturthi R. Sarma
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Active and Programmable Networks : IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers / / edited by David Hutchison, Spyros Denazis, Laurent Lefevre, Gary J. Minden
| Active and Programmable Networks : IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers / / edited by David Hutchison, Spyros Denazis, Laurent Lefevre, Gary J. Minden |
| Edizione | [1st ed. 2009.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
| Descrizione fisica | 1 online resource (XIII, 260 p.) |
| Disciplina | 004.6 |
| Altri autori (Persone) | HutchisonDavid <1949-> |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer networks
Software engineering Information storage and retrieval systems Electronic data processing - Management Data protection Application software Computer Communication Networks Software Engineering Information Storage and Retrieval IT Operations Data and Information Security Computer and Information Systems Applications |
| ISBN | 3-642-00972-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Programmable Networks and Heterogeneity -- Validating Inter-domain SLAs with a Programmable Traffic Control System -- Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking -- Towards Effective Portability of Packet Handling Applications across Heterogeneous Hardware Platforms -- Architectural Frameworks -- Architecture for an Active Network Infrastructure Grid – The iSEGrid -- Network Services on Service Extensible Routers -- A Network-Based Response Framework and Implementation -- Towards Resilient Networks Using Programmable Networking Technologies -- Node Architectures -- Towards the Design of an Industrial Autonomic Network Node -- A Web Service- and ForCES-Based Programmable Router Architecture -- An Extension to Packet Filtering of Programmable Networks -- Services -- SAND: A Scalable, Distributed and Dynamic Active Networks Directory Service -- A Programmable Structured Peer-to-Peer Overlay -- Interpreted Active Packets for Ephemeral State Processing Routers -- Short Papers -- A Secure Code Deployment Scheme for Active Networks -- Securing AODV Routing Protocol in Mobile Ad-Hoc Networks -- Extensible Network Configuration and Communication Framework -- A Model for Scalable and Autonomic Network Management -- Intelligibility Evaluation of a VoIP Multi-flow Block Interleaver -- A Web-Services Based Architecture for Dynamic-Service Deployment -- The Active Embedded Ubiquitous Web Service Framework -- Framework of an Application-Aware Adaptation Scheme for Disconnected Operations -- Kinetic Multipoint Relaying: Improvements Using Mobility Predictions -- The Three-Level Approaches for Differentiated Service in Clustering Web Server -- On the Manipulation of JPEG2000, In-Flight, Using Active Components on Next Generation Satellites -- TAON: ATopology-Oriented Active Overlay Network Protocol -- A Biologically Inspired Service Architecture in Ubiquitous Computing Environments. |
| Record Nr. | UNINA-9910483466903321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ad Hoc Networks : 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings / / edited by Jun Zheng, Wei Xiang, Pascal Lorenz, Shiwen Mao, Feng Yan
| Ad Hoc Networks : 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings / / edited by Jun Zheng, Wei Xiang, Pascal Lorenz, Shiwen Mao, Feng Yan |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XI, 304 p. 139 illus., 103 illus. in color.) |
| Disciplina | 004.685 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Artificial intelligence Data protection Computer Communication Networks Artificial Intelligence Data and Information Security |
| ISBN | 3-030-05888-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Ad Hoc Networks -- Resource Allocation -- Routing and Network Planning -- Localization and Tracking -- Handover, Scheduling, and Action Recognition -- Security -- Miscellaneous Topics in Wireless Networks. |
| Record Nr. | UNINA-9910337561603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ad Hoc Networks : 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings / / edited by Yifeng Zhou, Thomas Kunz
| Ad Hoc Networks : 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings / / edited by Yifeng Zhou, Thomas Kunz |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (X, 217 p. 84 illus.) |
| Disciplina | 004.685 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Application software Telecommunication Data protection Computers, Special purpose Computer simulation Computer Communication Networks Computer and Information Systems Applications Communications Engineering, Networks Data and Information Security Special Purpose and Application-Based Systems Computer Modelling |
| ISBN | 3-319-74439-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band -- The Sound of Communication in Underwater Acoustic Sensor Networks -- Applying Utility Theory to Improve Autonomous Underwater Vehicle Mission Payload Planning and Replanning -- Challenges of Misbehavior Detection in Industrial Wireless Networks -- A New Look at an Old Attack: ARP spoofing to create routing loops in ad hoc networks -- Integrating Intrusion Response Funtionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture -- Source Mobility in Vehicular Named-Data Networking: An Overview -- Flow-level Simulation for Adaptive Routing Protocols in Vehicular Ad-hoc Networks -- Control Overhead Reduction In Cluster-Based VANET Routing Protocol -- Ariel Networks and Routing -- A Hierarchical Framework for Estimating the Performance of an Aerial Network -- An Efficient Routing and Interface Assignment Algorithm for Multi-Channel Multi-Interface (MCMI) Ad Hoc Networks -- Exploiting Multiple Beam Antennas for End-to-End Delay Reduction in Ad Hoc Networks -- Trajectory and Buffer Aware Message Forwarding for Multiple Cooperating UAVs in Message Ferry Networks Cellular Networks, Sensor Networks -- Caching and Computing at the Edge for Mobile -- Augmented Reality and Virtual Reality (AR/VR) in 5G -- Evaluation of a Location Reporting System for mmWave Communication -- Fair Scheduling of Two-Hop Transmission with Energy Harvesting -- EEHCCP: An Energy-Efficient Hybrid Clustering Communication Protocol for Wireless Sensor Network -- A model for self-deployment of autonomous mobile sensor network in an unknown indoor environment. |
| Record Nr. | UNINA-9910299292503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / edited by Yifeng Zhou, Thomas Kunz
| Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / edited by Yifeng Zhou, Thomas Kunz |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XIV, 416 p. 176 illus.) |
| Disciplina | 004.685 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Data protection Computers, Special purpose Computer simulation Telecommunication Computer Communication Networks Data and Information Security Special Purpose and Application-Based Systems Computer Modelling Communications Engineering, Networks |
| ISBN | 3-319-51204-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Management of Surveillance Underwater Acoustic Networks -- Relative Localization for Small Wireless Sensor Networks -- Performance Study of the IEEE 802.15.6 Slotted Aloha Mechanism With Power Control in a Multiuser Environment -- New Selection Strategies of Actor’s Substitute in DARA for Connectivity Restoration in WSANs -- Asymmetric Multi-Way Ranging for Resource-Limited Nodes -- Comparison of RPL Routing Metrics on grids UAV and Vehicular Networks -- Communication and Coordination for Drone Networks 8 Intelligent Wireless AdHoc Routing Protocol and Controller for UAV Networks -- Theoretical Analysis of Obstruction’s influence on Data Dissemination in Vehicular Networks -- Performance Analysis for Traffic-aware Utility in Vehicular Ad Hoc Networks -- Investigation and Adaptation of Signal Propagation Models for a Mixed Outdoor-Indoor Scenario Using a Flying GSM Base Station Modelling and Analysis -- Optimizing Power Allocation in Wireless Networks: Are the Implicit Constraints Really Redundant? -- Towards Dynamic Capacity Management for the Masses -- Distance Distributions in Finite Ad Hoc Networks: Approaches, Applications, and Directions -- Towards More Realistic Network Simulations: Leveraging the System-Call Barrier -- 16 Resource Allocation for Relay-aided Cooperative Hospital Wireless Networks -- Improving the performance of challenged networks with controlled mobility -- SDN Coordination for CCN and FC Content Dissemination -- A Bandwidth Adaptation Scheme for Cloud Radio Access Networks -- Cooperative On-the-Fly Decision Making in Mobility-Controlled Multi Ferry Delay Tolerant Networks -- Multipath Routing Optimization with Interference Consideration in Wireless Ad hoc Network -- An Accurate Passive RFID Indoor Localization System based on SenseaTag and Zoning Algorithm Workshop on practical ad hoc network security and vulnerability -- Communication Links Vulnerability Model for Cyber Security Mitigation -- Entropy-Based Recommendation Trust Model for Machine to Machine Communications -- Reliability, Throughput and Latency Analysis of an Aerial Network -- Gender Assignment for Directional Full-Duplex FDD Nodes in a Multihop Wireless Network -- A Massive MIMO Panel Array at Ka-band with Flexible Patterns and Beam Steering Performance. |
| Record Nr. | UNINA-9910254844103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings / / edited by Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
| Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings / / edited by Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (XI, 263 p. 110 illus. in color.) |
| Disciplina | 004 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Computers, Special purpose Data protection Computer Communication Networks Special Purpose and Application-Based Systems Data and Information Security |
| ISBN | 3-319-25067-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Physical layer -- MAC and routing -- mobility in networks -- self-organization, virtualization and localization -- security and fault tolerance. |
| Record Nr. | UNINA-9910299256903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||