Quality, Reliability, Security and Robustness in Heterogeneous Systems
Editat de Xingliang Yuan, Wei Bao, Xun Yi, Nguyen Hoang Tranen Limba Engleză Paperback – 17 noi 2021
The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.
Preț: 530.58 lei
Preț vechi: 663.23 lei
-20% Nou
Puncte Express: 796
Preț estimativ în valută:
93.89€ • 110.10$ • 82.45£
93.89€ • 110.10$ • 82.45£
Carte disponibilă
Livrare economică 19 ianuarie-02 februarie 26
Livrare express 02-08 ianuarie 26 pentru 36.94 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030914233
ISBN-10: 3030914232
Pagini: 368
Ilustrații: XI, 353 p. 29 illus.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:1st edition 2021
Editura: Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3030914232
Pagini: 368
Ilustrații: XI, 353 p. 29 illus.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:1st edition 2021
Editura: Springer
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning in Distributed Networks.- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation.- Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning.- Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.- Blockchain Networks and Blockchain-based Applications.- Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability.- Toward Achieving Unanimity for Implicit Closings in a Trustless System.- DBS: Blockchain-based privacy-preserving RBAC in IoT.- 5G Networks and Security.- 8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones.- Anti-eavesdropping Proportional Fairness Access Control for 5G Networks.- Joint Relay Selection and Frequency Allocationfor D2D Communications.- IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.- A UsabilityStudy of Cryptographic API Design.- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function.- Network Security 15 Topology Validator - Defense against Topology Poisoning Attack in SDN.- Towards an Attention-based Accurate Intrusion Detection Approach.- Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options.- Privacy-preserving Emerging Networked Applications.- Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.- Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.