Listing 1 - 10 of 25 | << page >> |
Sort by
|
Choose an application
Choose an application
This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big data and its computational intelligence in supporting smart network operation, management, and optimization.
Choose an application
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
Computer communication systems. --- Computer security. --- Computer system failures. --- Computer Communication Networks. --- Systems and Data Security. --- System Performance and Evaluation. --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Failures --- Protection --- Security measures --- Distributed processing --- Computer networks --- Computer networks. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
Computer architecture. Operating systems --- computers --- computerbeveiliging --- computernetwerken
Choose an application
Computer networks --- Artificial intelligence. --- Machine learning. --- Security measures --- Data processing.
Choose an application
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Big Data Technologies and Applications, BDTA 2023, held in Edinburgh, United Kingdom, in August 2023. The 8 full papers and 3 short papers of BDTA 2023 were selected from 23 submissions and present new advances and research results in the fields of big data technologies, collection and storage, big data management and retrieval, big data mining and approaches.
Big data --- Computer networks. --- Computer systems. --- Electronic digital computers --- Software engineering. --- Computer programming. --- Computer Communication Networks. --- Computer System Implementation. --- System Performance and Evaluation. --- Software Engineering. --- Programming Techniques. --- Evaluation.
Choose an application
Programming --- Computer architecture. Operating systems --- Computer. Automation --- computers --- informatica --- computerbesturingssystemen --- programmeren (informatica) --- software engineering --- computernetwerken
Choose an application
The book comprises 12 chapters dealing with the following subjects: blockchains for network security; blockchain system architecture; blockchain consensus and incentives; Internet of Things; 5G and 6G networks; edgechain for organization-based multi-agent systems; privacy-preserving machine learning; smart metering; sharding; GIS; and remote sensing big data management and production
Blockchains (Databases) --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Block chains (Databases) --- Database security --- Distributed databases --- Cell phone systems --- Cryptography --- Data protection --- Geographic information systems --- Machine learning --- Multiagent systems --- Privacy --- Remote sensing --- Security measures --- Remote-sensing imagery --- Remote sensing systems --- Remote terrain sensing --- Sensing, Remote --- Terrain sensing, Remote --- Aerial photogrammetry --- Aerospace telemetry --- Detectors --- Space optics --- Social psychology --- Secrecy --- Solitude --- Agent-based model (Computer software) --- MASs (Multiagent systems) --- Multi-agent systems --- Systems, Multiagent --- Intelligent agents (Computer software) --- Learning, Machine --- Artificial intelligence --- Machine theory --- Geographical information systems --- GIS (Information systems) --- Information storage and retrieval systems --- Distributed data bases --- Distributed database systems --- Databases --- Cyberinfrastructure --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Cellular radio --- Cellular radiotelephone systems --- Cellular systems (Telecommunication) --- Cellular telephone systems --- Mobile telephony --- Wireless telephone systems (Cell phone) --- Mobile communication systems --- Telephone systems --- Geography
Choose an application
Computer architecture. Operating systems --- computers --- computerbeveiliging --- computernetwerken
Choose an application
How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolution is still very challenging. This book presents the state-of-the-art solutions to the theoretical and practical challenges stemming from the integration of 5G enabling technologies into IoTs in support of a smart 5G-enabled IoT paradigm, in terms of network design, operation, management, optimization, and applications. In particular, the technical focus covers a comprehensive understanding of 5G-enabled IoT architectures, converged access networks, smart network management, and emerging applications of 5G-eabled IoT.
Listing 1 - 10 of 25 | << page >> |
Sort by
|