Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 402
Editat de Xingliang Yuan, Wei Bao, Xun Yi, Nguyen Hoang Tranen Limba Engleză Paperback – 17 noi 2021
The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 5%
Preț: 307.64 lei - 20%
Preț: 314.67 lei -
Preț: 385.99 lei - 20%
Preț: 498.46 lei - 20%
Preț: 270.83 lei - 20%
Preț: 270.73 lei - 20%
Preț: 270.83 lei - 20%
Preț: 317.05 lei - 20%
Preț: 270.23 lei - 20%
Preț: 270.98 lei - 20%
Preț: 314.67 lei - 20%
Preț: 317.05 lei - 20%
Preț: 326.72 lei - 20%
Preț: 321.03 lei - 20%
Preț: 313.42 lei - 20%
Preț: 458.69 lei - 20%
Preț: 317.05 lei - 20%
Preț: 494.87 lei - 20%
Preț: 495.28 lei - 20%
Preț: 495.12 lei - 20%
Preț: 458.99 lei - 20%
Preț: 388.57 lei - 20%
Preț: 494.83 lei - 18%
Preț: 931.81 lei - 20%
Preț: 529.35 lei - 20%
Preț: 494.68 lei - 20%
Preț: 495.67 lei - 20%
Preț: 388.11 lei - 20%
Preț: 573.45 lei - 20%
Preț: 647.15 lei - 20%
Preț: 388.26 lei - 20%
Preț: 459.10 lei - 20%
Preț: 315.48 lei - 20%
Preț: 459.55 lei - 20%
Preț: 635.26 lei - 5%
Preț: 553.86 lei - 20%
Preț: 481.11 lei - 20%
Preț: 319.42 lei - 20%
Preț: 459.78 lei - 20%
Preț: 956.44 lei - 20%
Preț: 335.29 lei - 20%
Preț: 329.60 lei - 20%
Preț: 642.40 lei - 20%
Preț: 328.94 lei - 20%
Preț: 328.16 lei -
Preț: 370.10 lei - 20%
Preț: 644.77 lei - 5%
Preț: 287.80 lei - 20%
Preț: 314.86 lei
Preț: 530.10 lei
Preț vechi: 662.63 lei
-20% Nou
Puncte Express: 795
Preț estimativ în valută:
93.81€ • 109.39$ • 82.36£
93.81€ • 109.39$ • 82.36£
Carte disponibilă
Livrare economică 25 decembrie 25 - 08 ianuarie 26
Livrare express 11-17 decembrie pentru 35.16 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030914233
ISBN-10: 3030914232
Pagini: 353
Ilustrații: XI, 353 p. 29 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.51 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3030914232
Pagini: 353
Ilustrații: XI, 353 p. 29 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.51 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning in Distributed Networks.- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation.- Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning.- Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.- Blockchain Networks and Blockchain-based Applications.- Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability.- Toward Achieving Unanimity for Implicit Closings in a Trustless System.- DBS: Blockchain-based privacy-preserving RBAC in IoT.- 5G Networks and Security.- 8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones.- Anti-eavesdropping Proportional Fairness Access Control for 5G Networks.- Joint Relay Selection and Frequency Allocationfor D2D Communications.- IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.- A UsabilityStudy of Cryptographic API Design.- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function.- Network Security 15 Topology Validator - Defense against Topology Poisoning Attack in SDN.- Towards an Attention-based Accurate Intrusion Detection Approach.- Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options.- Privacy-preserving Emerging Networked Applications.- Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.- Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.