Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 402
Editat de Xingliang Yuan, Wei Bao, Xun Yi, Nguyen Hoang Tranen Limba Engleză Paperback – 17 noi 2021
The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 20% Preț: 327.12 lei
- Preț: 401.24 lei
- 20% Preț: 329.58 lei
- 20% Preț: 327.12 lei
- 20% Preț: 329.58 lei
- 20% Preț: 339.66 lei
- 20% Preț: 333.72 lei
- 20% Preț: 325.80 lei
- 20% Preț: 329.58 lei
- 18% Preț: 969.44 lei
- 20% Preț: 596.46 lei
- 20% Preț: 673.17 lei
- 20% Preț: 327.95 lei
- 20% Preț: 451.70 lei
- 20% Preț: 660.81 lei
- 20% Preț: 332.06 lei
- 20% Preț: 348.57 lei
- 20% Preț: 342.65 lei
- 20% Preț: 668.22 lei
- 20% Preț: 341.95 lei
- 20% Preț: 341.15 lei
- Preț: 384.70 lei
- 20% Preț: 670.70 lei
- 5% Preț: 299.06 lei
- 20% Preț: 327.29 lei
- 20% Preț: 326.46 lei
- 20% Preț: 416.63 lei
- 20% Preț: 331.74 lei
- 20% Preț: 336.54 lei
- 20% Preț: 410.85 lei
- 20% Preț: 341.30 lei
- 20% Preț: 336.21 lei
- 20% Preț: 332.71 lei
- 20% Preț: 339.47 lei
- 20% Preț: 336.54 lei
- 20% Preț: 297.00 lei
- 20% Preț: 409.87 lei
- 20% Preț: 334.71 lei
- 20% Preț: 681.61 lei
- 20% Preț: 325.95 lei
- 20% Preț: 329.58 lei
- 5% Preț: 328.95 lei
- 20% Preț: 334.86 lei
- 20% Preț: 326.64 lei
- 20% Preț: 304.10 lei
- 20% Preț: 299.95 lei
- 20% Preț: 297.81 lei
- 20% Preț: 300.32 lei
- 20% Preț: 299.95 lei
- 20% Preț: 304.26 lei
Preț: 592.02 lei
Preț vechi: 740.03 lei
-20% Nou
Puncte Express: 888
Preț estimativ în valută:
113.28€ • 118.59$ • 93.73£
113.28€ • 118.59$ • 93.73£
Carte tipărită la comandă
Livrare economică 05-19 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030914233
ISBN-10: 3030914232
Pagini: 353
Ilustrații: XI, 353 p. 29 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.51 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3030914232
Pagini: 353
Ilustrații: XI, 353 p. 29 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.51 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning in Distributed Networks.- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation.- Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning.- Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.- Blockchain Networks and Blockchain-based Applications.- Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability.- Toward Achieving Unanimity for Implicit Closings in a Trustless System.- DBS: Blockchain-based privacy-preserving RBAC in IoT.- 5G Networks and Security.- 8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones.- Anti-eavesdropping Proportional Fairness Access Control for 5G Networks.- Joint Relay Selection and Frequency Allocationfor D2D Communications.- IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.- A UsabilityStudy of Cryptographic API Design.- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function.- Network Security 15 Topology Validator - Defense against Topology Poisoning Attack in SDN.- Towards an Attention-based Accurate Intrusion Detection Approach.- Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options.- Privacy-preserving Emerging Networked Applications.- Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.- Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.