Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))

Buy
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following topical sections: network security, and privacy-preserving; pervasive sensing and analysis; cloud computing, mobile computing, and crowd sensing; social and urban computing; parallel and distributed systems, optimization;  pervasive applications; and data mining and knowledge mining.

In recent years, wireless networks are becoming more and more popular. Wireless Local Area Networks are deployed both in the company and in public or home. A vibrant access point AP is also hugely convenient for people, especially those who use mobile terminals. The number of mobile users has been increasing these years, and the field is continually covering social, games, video, news, finance and so on. More and more users tend to use the mobile to interact, which is the natural advantage of the mobile terminal, but also make it a target of public criticism.

Therefore, how to make up for the loopholes in the mobile Internet as much as possible, and how to detect and prevent a variety of known and unknown intrusion is a critical thing.

This paper proposed a method of identifying complicated multistep attacks orient ing to wireless intrusion detection system (MSWIDS), which includes the submodules of alarm simplification, virtual topology graph (VTG) generator, logic attack graph (LAG) generator, attack signature database, attack path resolver and complex attack evaluation. Using introducing logic attack diagram and virtual topological graph, the

attach path was excavated. The experimental result showed that this identification method applies to the real scene of wireless intrusion detection, which plays certain significance to predict attackers’ ultimate attack intention.
 
(HTML tags aren't allowed.)

Introduction to Video Search Engines
Introduction to Video Search Engines
Video search engines enable users to take advantage of constantly growing video resources like, for example, video on demand, Internet television and YouTube, for a wide variety of applications including entertainment, education and communications.

David Gibbon and Zhu Liu describe the current state of video search engine technology and inform...

Transdisciplinary Digital Art: Sound, Vision and the New Screen (Communications in Computer and Information Science)
Transdisciplinary Digital Art: Sound, Vision and the New Screen (Communications in Computer and Information Science)
This volume collects selected papers from the past two instances of Digital Art Weeks (Zurich, Switzerland) and Interactive Futures (Victoria, BC, Canada), two parallel festivals of digital media art. The work represented in Transdisciplinary Digital Art is a confirmation of the vitality and breadth of the digital arts. Collecting essays that...
Modern Java Recipes: Simple Solutions to Difficult Problems in Java 8 and 9
Modern Java Recipes: Simple Solutions to Difficult Problems in Java 8 and 9

The introduction of functional programming concepts in Java SE 8 was a drastic change for this venerable object-oriented language. Lambda expressions, method references, and streams fundamentally changed the idioms of the language, and many developers have been trying to catch up ever since. This cookbook will help. With more than 70...


PC Magazine January 2006
PC Magazine January 2006
Articles in January 2006 issue of PC Magazine

    * US High Court Refuses to Review RIM Patent Ruling
      by Reuters  
    * DTV Alliance Takes Mobile TV To The Masses
      by Bary Alyssa Johnson
    * Government
...
Becoming Agile: ...in an imperfect world
Becoming Agile: ...in an imperfect world
Many books discuss Agile from a theoretical or academic perspective. Becoming Agile takes a different approach and focuses on explaining Agile from a case-study perspective. Agile principles are discussed, explained, and then demonstrated in the context of a case study that flows throughout the book. The case study is based on a mixture of...
Hard Disk Drive: Mechatronics and Control (Control Engineering)
Hard Disk Drive: Mechatronics and Control (Control Engineering)

The hard disk drive (HDD) is an excellent example of the practical application of precision mechatronics. Hard Disk Drive: Mechatronics and Control describes the control aspects of an HDD, explains difficulties faced by designers, provides solutions, and highlights challenges of future-generation drives. Combining academic interests with...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy