| Título : |
Mobile Networks and Management : 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Hu, Jiankun, ; Khalil, Ibrahim, ; Tari, Zahir, ; Wen, Sheng, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2018 |
| Número de páginas: |
XIII, 392 p. 112 ilustraciones |
| ISBN/ISSN/DL: |
978-3-319-90775-8 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Red de computadoras Protección de datos Computadoras y civilización Software de la aplicacion Computadoras Propósitos especiales Criptografía Cifrado de datos (Informática) Redes de comunicación informática Seguridad de datos e información Computadoras y sociedad Aplicaciones informáticas y de sistemas de información Sistemas de propósito especial y basados en aplicaciones Criptología |
| Índice Dewey: |
004.6 Ciencia de los computadores (Interfaces y comunicaciones) |
| Resumen: |
Este libro constituye las actas arbitradas posteriores a la conferencia de la 9.ª Conferencia Internacional sobre Gestión y Redes Móviles, MONAMI 2017, celebrada en Melbourne, Australia, en diciembre de 2017. Los 30 artículos completos revisados fueron cuidadosamente revisados y seleccionados entre 43 presentaciones. Los artículos abordan temas en el área de informática móvil, redes inalámbricas y gestión. |
| Nota de contenido: |
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications -- Persistent vs Service IDs in Android: Session Fingerprinting from Apps -- Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques -- Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework -- Robust Fingerprint Matching Based on Convolutional Neural Networks -- A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data -- Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling -- Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring -- Estimating public opinion in social media content using aspect-based opinion mining -- A Robust Contactless Fingerprint Enhancement Algorithm -- Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and MachineLearning -- A Variant of BLS Signature Scheme With Tight Security Reduction -- Quantum authentication scheme based on fingerprintencoded graph states -- Cooperative Information Security/ Cybersecurity Curriculum Development -- An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks -- Homomorphic Evaluation of Database Queries -- A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks -- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources -- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs -- Performance Assessment of Cloud Migrations from Network and Application Point of View -- A Cloud Service Enhanced Method Supporting Context-aware Applications -- Application of 3D Delaunay Triangulation in Fingerprint Authentication System -- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources -- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs -- Performance Assessment of Cloud Migrations from Network and Application Point of View -- A Cloud Service Enhanced Method Supporting Context-aware Applications -- Application of 3D Delaunay Triangulation in Fingerprint Authentication System -- The Public Verifiability of Public Key Encryption with Keyword Search -- Malicious Bitcoin Transaction Tracing Using Incidence -- Relation Clustering -- Cryptanalysis of Salsa and ChaCha: Revisited -- CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains -- Probability Risk Identification Based Intrusion Detection System for SCADA Systems -- Anonymizing k-NN Classification on MapReduce -- A Cancellable Ranking based Hashing Method for Fingerprint Template Protection. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Mobile Networks and Management : 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings [documento electrónico] / Hu, Jiankun, ; Khalil, Ibrahim, ; Tari, Zahir, ; Wen, Sheng, . - 1 ed. . - [s.l.] : Springer, 2018 . - XIII, 392 p. 112 ilustraciones. ISBN : 978-3-319-90775-8 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Red de computadoras Protección de datos Computadoras y civilización Software de la aplicacion Computadoras Propósitos especiales Criptografía Cifrado de datos (Informática) Redes de comunicación informática Seguridad de datos e información Computadoras y sociedad Aplicaciones informáticas y de sistemas de información Sistemas de propósito especial y basados en aplicaciones Criptología |
| Índice Dewey: |
004.6 Ciencia de los computadores (Interfaces y comunicaciones) |
| Resumen: |
Este libro constituye las actas arbitradas posteriores a la conferencia de la 9.ª Conferencia Internacional sobre Gestión y Redes Móviles, MONAMI 2017, celebrada en Melbourne, Australia, en diciembre de 2017. Los 30 artículos completos revisados fueron cuidadosamente revisados y seleccionados entre 43 presentaciones. Los artículos abordan temas en el área de informática móvil, redes inalámbricas y gestión. |
| Nota de contenido: |
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications -- Persistent vs Service IDs in Android: Session Fingerprinting from Apps -- Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques -- Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework -- Robust Fingerprint Matching Based on Convolutional Neural Networks -- A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data -- Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling -- Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring -- Estimating public opinion in social media content using aspect-based opinion mining -- A Robust Contactless Fingerprint Enhancement Algorithm -- Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and MachineLearning -- A Variant of BLS Signature Scheme With Tight Security Reduction -- Quantum authentication scheme based on fingerprintencoded graph states -- Cooperative Information Security/ Cybersecurity Curriculum Development -- An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks -- Homomorphic Evaluation of Database Queries -- A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks -- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources -- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs -- Performance Assessment of Cloud Migrations from Network and Application Point of View -- A Cloud Service Enhanced Method Supporting Context-aware Applications -- Application of 3D Delaunay Triangulation in Fingerprint Authentication System -- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources -- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs -- Performance Assessment of Cloud Migrations from Network and Application Point of View -- A Cloud Service Enhanced Method Supporting Context-aware Applications -- Application of 3D Delaunay Triangulation in Fingerprint Authentication System -- The Public Verifiability of Public Key Encryption with Keyword Search -- Malicious Bitcoin Transaction Tracing Using Incidence -- Relation Clustering -- Cryptanalysis of Salsa and ChaCha: Revisited -- CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains -- Probability Risk Identification Based Intrusion Detection System for SCADA Systems -- Anonymizing k-NN Classification on MapReduce -- A Cancellable Ranking based Hashing Method for Fingerprint Template Protection. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |