Autonomous Control for a Reliable Internet of Services : Methods, Models, Approaches, Techniques, Algorithms, and Tools |
Autore | Ganchev Ivan (Telecommunications engineer) |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2018 |
Descrizione fisica | 1 online resource (XVI, 401 pages 120 illustration) |
Disciplina | 004.6 |
Altri autori (Persone) |
van der MeiR. D
van den BergHans |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computer system failures Special purpose computers Application software Coding theory Information theory E-commerce Computer Communication Networks System Performance and Evaluation Special Purpose and Application-Based Systems Information Systems Applications (incl. Internet) Coding and Information Theory e-Commerce/e-business |
Soggetto non controllato |
Human-Computer Interactopm (HCI)
Internet of Services (IoS) Internet of Things (IoT) data communication systems quality of service (QoS) computer networks multimedia systems user interfaces quality of experience (QoE) telecommunication networks computer systems information theory cloud computing communication channels internet telecommunication traffic |
ISBN | 3-319-90415-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | State-of-the-Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services -- Context Monitoring for Improved System Performance and QoE -- QoE Management for Future Networks -- Scalable Traffic Quality and System Efficiency Indicators towards Overall Telecommunication System's QoE Management -- Lag Compensation for First Person Shooter Games in Cloud Gaming -- The Value of Context-awareness in Bandwidth-challenging HTTP Adaptive Streaming Scenarios -- Conceptual and Analytical Models for Predicting the Quality of Service of Overall Telecommunication Systems -- QoS-based Elasticity for Service Chains in Distributed Edge Cloud Environments -- Integrating SDN and NFV with QoS-aware Service Composition -- Energy vs. QoX Network- and Cloud Services Management -- Traffic Management for Cloud Federation -- Efficient Simulation of IoT Cloud Use Cases -- Security of Internet of Things for Reliable Internet of Services -- TCP performance over current cellular access: A comprehensive analysis. |
Record Nr. | UNISA-996465829503316 |
Ganchev Ivan (Telecommunications engineer)
![]() |
||
Cham : , : Springer International Publishing AG, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Autonomous Control for a Reliable Internet of Services : Methods, Models, Approaches, Techniques, Algorithms, and Tools |
Autore | Ganchev Ivan (Telecommunications engineer) |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2018 |
Descrizione fisica | 1 online resource (XVI, 401 pages 120 illustration) |
Disciplina | 004.6 |
Altri autori (Persone) |
van der MeiR. D
van den BergHans |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer networks
Computer system failures Computers, Special purpose Application software Coding theory Information theory Electronic commerce Computer Communication Networks System Performance and Evaluation Special Purpose and Application-Based Systems Information Systems Applications (incl. Internet) Coding and Information Theory e-Commerce/e-business |
Soggetto non controllato |
Human-Computer Interactopm (HCI)
Internet of Services (IoS) Internet of Things (IoT) data communication systems quality of service (QoS) computer networks multimedia systems user interfaces quality of experience (QoE) telecommunication networks computer systems information theory cloud computing communication channels internet telecommunication traffic |
ISBN | 3-319-90415-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | State-of-the-Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services -- Context Monitoring for Improved System Performance and QoE -- QoE Management for Future Networks -- Scalable Traffic Quality and System Efficiency Indicators towards Overall Telecommunication System's QoE Management -- Lag Compensation for First Person Shooter Games in Cloud Gaming -- The Value of Context-awareness in Bandwidth-challenging HTTP Adaptive Streaming Scenarios -- Conceptual and Analytical Models for Predicting the Quality of Service of Overall Telecommunication Systems -- QoS-based Elasticity for Service Chains in Distributed Edge Cloud Environments -- Integrating SDN and NFV with QoS-aware Service Composition -- Energy vs. QoX Network- and Cloud Services Management -- Traffic Management for Cloud Federation -- Efficient Simulation of IoT Cloud Use Cases -- Security of Internet of Things for Reliable Internet of Services -- TCP performance over current cellular access: A comprehensive analysis. |
Record Nr. | UNINA-9910293146403321 |
Ganchev Ivan (Telecommunications engineer)
![]() |
||
Cham : , : Springer International Publishing AG, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou |
Autore | Lu Wei |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Springer Nature, 2020 |
Descrizione fisica | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks - Security measures Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security |
Soggetto non controllato |
Systems and Data Security
Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption |
ISBN | 981-334-922-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
Record Nr. | UNISA-996465362903316 |
Lu Wei
![]() |
||
Springer Nature, 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou |
Autore | Lu Wei |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Springer Nature, 2020 |
Descrizione fisica | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networks Application software Computer architecture Data encryption (Computer science) Computer networks - Security measures Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security |
Soggetto non controllato |
Systems and Data Security
Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption |
ISBN | 981-334-922-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
Record Nr. | UNINA-9910447240103321 |
Lu Wei
![]() |
||
Springer Nature, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
Autore | Kołodziej Joanna |
Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
Collana | Lecture notes in computer science |
Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures |
Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
ISBN | 3-031-04036-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
Record Nr. | UNISA-996472069303316 |
Kołodziej Joanna
![]() |
||
Cham, : Springer International Publishing AG, 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
Autore | Kołodziej Joanna |
Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
Collana | Lecture notes in computer science |
Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures Seguretat de les xarxes d'ordinadors Empreses Processament de dades Seguretat informàtica |
Soggetto genere / forma | Llibres electrònics |
Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
ISBN | 3-031-04036-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
Record Nr. | UNINA-9910558694303321 |
Kołodziej Joanna
![]() |
||
Cham, : Springer International Publishing AG, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|