Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 402
Editat de Xingliang Yuan, Wei Bao, Xun Yi, Nguyen Hoang Tranen Limba Engleză Paperback – 17 noi 2021
The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 20% Preț: 135.45 lei
- 20% Preț: 320.53 lei
- Preț: 393.18 lei
- 20% Preț: 322.96 lei
- 20% Preț: 320.53 lei
- 20% Preț: 322.96 lei
- 20% Preț: 332.83 lei
- 20% Preț: 327.02 lei
- 20% Preț: 319.25 lei
- 20% Preț: 322.96 lei
- 18% Preț: 949.80 lei
- 20% Preț: 584.40 lei
- 20% Preț: 659.55 lei
- 20% Preț: 321.35 lei
- 20% Preț: 451.70 lei
- 20% Preț: 647.43 lei
- 20% Preț: 325.38 lei
- 20% Preț: 341.55 lei
- 20% Preț: 335.74 lei
- 20% Preț: 654.71 lei
- 20% Preț: 335.08 lei
- 20% Preț: 334.30 lei
- Preț: 376.97 lei
- 20% Preț: 657.12 lei
- 5% Preț: 293.07 lei
- 20% Preț: 320.71 lei
- 20% Preț: 319.89 lei
- 20% Preț: 408.23 lei
- 20% Preț: 325.06 lei
- 20% Preț: 402.58 lei
- 20% Preț: 334.43 lei
- 20% Preț: 329.44 lei
- 20% Preț: 326.03 lei
- 20% Preț: 332.64 lei
- 20% Preț: 329.76 lei
- 20% Preț: 291.05 lei
- 20% Preț: 401.63 lei
- 20% Preț: 327.98 lei
- 20% Preț: 667.82 lei
- 20% Preț: 319.40 lei
- 20% Preț: 322.96 lei
- 5% Preț: 322.35 lei
- 20% Preț: 328.13 lei
- 20% Preț: 320.06 lei
- 20% Preț: 297.99 lei
- 20% Preț: 293.94 lei
- 20% Preț: 291.84 lei
- 20% Preț: 294.28 lei
- 20% Preț: 293.94 lei
- 20% Preț: 298.14 lei
Preț: 580.06 lei
Preț vechi: 725.08 lei
-20% Nou
Puncte Express: 870
Preț estimativ în valută:
111.01€ • 115.31$ • 92.21£
111.01€ • 115.31$ • 92.21£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030914233
ISBN-10: 3030914232
Pagini: 353
Ilustrații: XI, 353 p. 29 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.51 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3030914232
Pagini: 353
Ilustrații: XI, 353 p. 29 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.51 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning in Distributed Networks.- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation.- Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning.- Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.- Blockchain Networks and Blockchain-based Applications.- Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability.- Toward Achieving Unanimity for Implicit Closings in a Trustless System.- DBS: Blockchain-based privacy-preserving RBAC in IoT.- 5G Networks and Security.- 8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones.- Anti-eavesdropping Proportional Fairness Access Control for 5G Networks.- Joint Relay Selection and Frequency Allocationfor D2D Communications.- IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.- A UsabilityStudy of Cryptographic API Design.- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function.- Network Security 15 Topology Validator - Defense against Topology Poisoning Attack in SDN.- Towards an Attention-based Accurate Intrusion Detection Approach.- Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options.- Privacy-preserving Emerging Networked Applications.- Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.- Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.