Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))

Buy
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following topical sections: network security, and privacy-preserving; pervasive sensing and analysis; cloud computing, mobile computing, and crowd sensing; social and urban computing; parallel and distributed systems, optimization;  pervasive applications; and data mining and knowledge mining.

In recent years, wireless networks are becoming more and more popular. Wireless Local Area Networks are deployed both in the company and in public or home. A vibrant access point AP is also hugely convenient for people, especially those who use mobile terminals. The number of mobile users has been increasing these years, and the field is continually covering social, games, video, news, finance and so on. More and more users tend to use the mobile to interact, which is the natural advantage of the mobile terminal, but also make it a target of public criticism.

Therefore, how to make up for the loopholes in the mobile Internet as much as possible, and how to detect and prevent a variety of known and unknown intrusion is a critical thing.

This paper proposed a method of identifying complicated multistep attacks orient ing to wireless intrusion detection system (MSWIDS), which includes the submodules of alarm simplification, virtual topology graph (VTG) generator, logic attack graph (LAG) generator, attack signature database, attack path resolver and complex attack evaluation. Using introducing logic attack diagram and virtual topological graph, the

attach path was excavated. The experimental result showed that this identification method applies to the real scene of wireless intrusion detection, which plays certain significance to predict attackers’ ultimate attack intention.
 
(HTML tags aren't allowed.)

Learning jQuery 1.3
Learning jQuery 1.3
Packed with great examples and clear explanations, this revised and updated version of Learning jQuery teaches you how to use jQuery 1.3. This book is for web designers who want to create interactive elements for their designs, and for developers who want to create the best user interface for their web applications. Basic JavaScript programming...
Pragmatic Ajax: A Web 2.0 Primer
Pragmatic Ajax: A Web 2.0 Primer
This is a book about developing effective web applications. We’re not
going to dance around this issue. Underneath everything else, this
book is about XHTML, JavaScript, CSS, and standards that have been
around for almost a decade now. Not only do we admit this truth,
we embrace it. Just because these standards have been
...
Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...

Linux Debugging and Performance Tuning : Tips and Techniques
Linux Debugging and Performance Tuning : Tips and Techniques

This is the definitive guide to Linux software debugging and performance optimization at both the kernel and application levels. Using extensive Linux code examples, Steve Best systematically introduces open source tools and best-practice techniques for delivering bug-free, well-tuned code.

Drawing on...

Pro JavaFX 9: A Definitive Guide to Building Desktop, Mobile, and Embedded Java Clients
Pro JavaFX 9: A Definitive Guide to Building Desktop, Mobile, and Embedded Java Clients

At the annual JavaOne conference in May 2007, Sun Microsystems announced a new product family named JavaFX. Its stated purpose includes enabling the development and deployment of content-rich applications on consumer devices such as cell phones, televisions, in-dash car systems, and browsers. Josh Marinacci, a software engineer at Sun, made...

VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy