Muutke küpsiste eelistusi

Future Network Systems and Security: Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings 1st ed. 2016 [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 195 pages, kõrgus x laius: 235x155 mm, kaal: 3226 g, 81 Illustrations, black and white; X, 195 p. 81 illus., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 670
  • Ilmumisaeg: 14-Oct-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319480200
  • ISBN-13: 9783319480206
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 195 pages, kõrgus x laius: 235x155 mm, kaal: 3226 g, 81 Illustrations, black and white; X, 195 p. 81 illus., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 670
  • Ilmumisaeg: 14-Oct-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319480200
  • ISBN-13: 9783319480206
Teised raamatud teemal:
This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016.The 12 full papers and one short paper presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, communications, systems and security aspects of relevance to the network of the future.

Technology.- Communications.- Systems and security aspects of relevance to future networks.
AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling
1(11)
Mordechai Guri
Matan Monitz
Yuval Elovici
Statistical Network Anomaly Detection: An Experimental Study
12(14)
Christian Callegari
Stefano Giordano
Michele Pagano
Power Usage Efficiency with a Modular Routing Protocol
26(21)
Yoshihiro Nozaki
Nirmala Shenoy
Aparna Gupta
Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures
47(15)
Vasileios Gkioulos
Stephen D. Wolthusen
A Social Behavior Based Interest-Message Dissemination Approach in Delay Tolerant Networks
62(19)
Tzu-Chieh Tsai
Ho-Hsiang Chan
Chien Chun Han
Po-Chi Chen
The Looking-Glass System: A Unidirectional Network for Secure Data Transfer Using an Optic Medium
81(17)
Gal Oren
Lior Amar
David Levy-Hevroni
Guy Malamud
Privacy Preserving Consensus-Based Economic Dispatch in Smart Grid Systems
98(13)
Avikarsha Mandal
Network DDoS Layer 3/4/7 Mitigation via Dynamic Web Redirection
111(15)
Todd Booth
Karl Andersson
Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept
126(16)
Gaith Al
Robin Doss
Morshed Chowdhury
Biplob Ray
A Roadmap for Upgrading Unupgradable Legacy Processes in Inter-Organizational Middleware Systems
142(15)
Radhouane B.N. Jrad
M. Daud Ahmed
David Sundaram
Sustainable, Holistic, Adaptable, Real-Time, and Precise (SHARP) Approach Towards Developing Health and Wellness Systems
157(15)
Farhaan Mirza
Asfahaan Mirza
Claris Yee Seung Chung
David Sundaram
Connected Bicycles
172(15)
Otto B. Piramuthu
Collaborative Network Coding in Opportunistic Mobile Social Network
187(8)
Tzu-Chieh Tsai
Chien-Chun Han
Shou-Yu Yen
Author Index 195