Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Software-Defined Networking and Security
  • Language: en
  • Pages: 357

Software-Defined Networking and Security

  • Type: Book
  • -
  • Published: 2018-12-07
  • -
  • Publisher: CRC Press

Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security

Cloud Network Management
  • Language: en
  • Pages: 258

Cloud Network Management

  • Type: Book
  • -
  • Published: 2020-10-26
  • -
  • Publisher: CRC Press

Data storage, processing, and management at remote location over dynamic networks is the most challenging task in cloud networks. Users’ expectations are very high for data accuracy, reliability, accessibility, and availability in pervasive cloud environment. It was the core motivation for the Cloud Networks Internet of Things (CNIoT). The exponential growth of the networks and data management in CNIoT must be implemented in fast growing service sectors such as logistic and enterprise management. The network based IoT works as a bridge to fill the gap between IT and cloud networks, where data is easily accessible and available. This book provides a framework for the next generation of clou...

Attribute-Based Encryption and Access Control
  • Language: en
  • Pages: 339

Attribute-Based Encryption and Access Control

  • Type: Book
  • -
  • Published: 2020-02-25
  • -
  • Publisher: CRC Press

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data acc...

Social Media Analytics for User Behavior Modeling
  • Language: en
  • Pages: 101

Social Media Analytics for User Behavior Modeling

  • Type: Book
  • -
  • Published: 2020-01-21
  • -
  • Publisher: CRC Press

In recent years social media has gained significant popularity and has become an essential medium of communication. Such user-generated content provides an excellent scenario for applying the metaphor of mining any information. Transfer learning is a research problem in machine learning that focuses on leveraging the knowledge gained while solving one problem and applying it to a different, but related problem. Features: Offers novel frameworks to study user behavior and for addressing and explaining task heterogeneity Presents a detailed study of existing research Provides convergence and complexity analysis of the frameworks Includes algorithms to implement the proposed research work Covers extensive empirical analysis Social Media Analytics for User Behavior Modeling: A Task Heterogeneity Perspective is a guide to user behavior modeling in heterogeneous settings and is of great use to the machine learning community.

Modeling and Design of Secure Internet of Things
  • Language: en
  • Pages: 697

Modeling and Design of Secure Internet of Things

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces intr...

Proceedings of the Third International Afro-European Conference for Industrial Advancement — AECIA 2016
  • Language: en
  • Pages: 396

Proceedings of the Third International Afro-European Conference for Industrial Advancement — AECIA 2016

  • Type: Book
  • -
  • Published: 2017-08-15
  • -
  • Publisher: Springer

The Afro-European Conference for Industrial Advancement (AECIA) brought together the foremost experts and excellent young researchers from Africa, Europe and the rest of the world to disseminate the latest results from various fields of engineering, information and communication technologies. This volume gathers the carefully selected papers from the third installment of the AECIA, which was held in Marrakech, Morocco from November 21 to 23, 2016. The papers address important topics like Automation Systems, Intelligent Techniques and Algorithms, Information and Communication Technology (ICT) Applications in Engineering, Control, Optimization and Processing, as well as manufacturing-related topics. As such, it offers a valuable reference guide for researchers, students and practitioners in the fields of computer science and engineering.

Holistic Approach to Quantum Cryptography in Cyber Security
  • Language: en
  • Pages: 257

Holistic Approach to Quantum Cryptography in Cyber Security

  • Type: Book
  • -
  • Published: 2022-08-09
  • -
  • Publisher: CRC Press

This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques’ architectures and design, cyber security techniques management, software-defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology.

Mobile Cloud Computing
  • Language: en
  • Pages: 338

Mobile Cloud Computing

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devic...

Cybersecurity and Privacy in Cyber Physical Systems
  • Language: en
  • Pages: 455

Cybersecurity and Privacy in Cyber Physical Systems

  • Type: Book
  • -
  • Published: 2019-05-01
  • -
  • Publisher: CRC Press

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader’s awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs D...

Network Routing
  • Language: en
  • Pages: 1020

Network Routing

Network Routing: Algorithms, Protocols, and Architectures, Second Edition, explores network routing and how it can be broadly categorized into Internet routing, circuit-switched routing, and telecommunication transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing. Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of...