|
|
|
|
LEADER |
05535nam a2200589 4500 |
001 |
978-3-030-22885-9 |
003 |
DE-He213 |
005 |
20191024072059.0 |
007 |
cr nn 008mamaa |
008 |
190620s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030228859
|9 978-3-030-22885-9
|
024 |
7 |
|
|a 10.1007/978-3-030-22885-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Mobile, Secure, and Programmable Networking
|h [electronic resource] :
|b 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, Revised Selected Papers /
|c edited by Éric Renault, Selma Boumerdassi, Cherkaoui Leghris, Samia Bouzefrane.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XIII, 277 p. 134 illus., 102 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Computer Communication Networks and Telecommunications ;
|v 11557
|
505 |
0 |
|
|a Deep Generative Models for Image Generation: A Practical Comparison Between Variational Autoencoders and Generative Adversarial Networks -- A Game Stochastic Model for Data Dissemination Between Ferries and Cluster Head in Delay Tolerant Networks Routing Hierarchical Topology -- Delay-Bandwidth Optimization Method Based on Ant Colony Algorithm Applied to Transport Network Using SDN Paradigm -- CCN Context-Naming for Efficient Context-Aware Service Discovery in IoT -- Efficient Distributed Authentication and Access Control System Management for Internet of Things Using Blockchain -- Design of a New Patch Antenna Using EBG Structures and Superstarte Operating in the Ku-Band for 5G Cellular Networks -- A Data-Filtering Approach for Large-Scale Integrated RFID and Sensor Networks -- High Gain Metallic Electromagnetic Band Gap Antenna for WLAN Applications -- Toward Design of Advanced System-on-Chip Architecture for Mobile Computing Devices -- A Multiresolution-Based Fusion Strategy for Improving Speech Emotion Recognition Efficiency -- ECG Beat Classification Based on Stationary Wavelet Transform -- Cross-Subject EEG Signal Classification with Deep Neural Networks Applied to Motor Imagery -- Data Communication in Electromagnetic Nano-Networks for Healthcare Applications -- A Distributed Ensemble of Deep Convolutional Neural Networks with Random Forest for Big Data Sentiment Analysis -- Road Safety against Sybil Attacks Based on RSU Collaboration in VANET Environment -- A New Alert Message Dissemination Protocol for VANETs Based on LEACH Routing Protocol and Simulation in Random Waypoint Model Scenario -- Towards Semantic Integration of Heterogeneous Data Based on the Ontologies Modeling -- A Comparison Between MADM Methods and Utility Functions in the Network Selection Context -- A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection -- A New Mechanism to Secure IPv6 Networks Using Symmetric Cryptography -- Deep Neural Networks for Indoor Localization Using WiFi Fingerprints -- A New Secure Cellular Automata Cryptosystem for Embedded Devices -- An ElGamal-like Digital Signature Based on Elliptic Curves. .
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. The 23 papers presented in this volume were carefully reviewed and selected from 48 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security. .
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I13030
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
700 |
1 |
|
|a Renault, Éric.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Boumerdassi, Selma.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Leghris, Cherkaoui.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Bouzefrane, Samia.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030228842
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030228866
|
830 |
|
0 |
|a Computer Communication Networks and Telecommunications ;
|v 11557
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-22885-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|