000 04773nam a22005055i 4500
001 978-3-319-03692-2
003 DE-He213
005 20200421112048.0
007 cr nn 008mamaa
008 140205s2014 gw | s |||| 0|eng d
020 _a9783319036922
_9978-3-319-03692-2
024 7 _a10.1007/978-3-319-03692-2
_2doi
050 4 _aTK1-9971
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
082 0 4 _a621.382
_223
245 1 0 _aNetworks and Communications (NetCom2013)
_h[electronic resource] :
_bProceedings of the Fifth International Conference on Networks & Communications /
_cedited by Natarajan Meghanathan, Dhinaharan Nagamalai, Sanguthevar Rajasekaran.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aXV, 335 p. 139 illus., 85 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1100 ;
_v284
505 0 _aPart I: Measurement and Performance Analysis -- An Evaluation of EpiChord in OverSim -- Enhanced back-off technique for IEEE 802.15.4 WSN standard --  Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks -- Performance Analysis of Correlated Channel for UWB-MIMO System -- Part II: Network Architectures, Protocols and Routing -- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance -- Spanning Tree-based Data Gathering in Mobile Sensor Networks -- Wireless Networks: An Instance of Tandem Discrete-Time Queues -- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments -- A Dynamic Trust Computation Model for Peer to Peer Network -- Road Traffic Management using Egyptian Vulture Optimization Algorithm - A New Graph Agent-Based Optimization Meta-Heuristic Algorithm -- Part III: Adhoc and Sensor Networks -- A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks -- Energy Efficient Localization in Wireless Sensor Networks -- Part IV: Network Security, Trust and Privacy -- Data Integrity Verification in Hybrid Cloud using TTPA -- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy -- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient -- Improved Technique for Data Confidentiality in Cloud Environment -- A Hybrid-Based Feature Selection Approach for IDS -- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network -- Empirical Study of Email Security Threats and Countermeasures -- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm -- Reputation-Based Trust Management for Distributed Spectrum Sensing -- Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning -- A Novel Key Exchange Protocol provably secure against Man-In-The-Middle Attack -- Neutralizing DoS attacks on Linux Servers -- Part V: Wireless and Mobile Networks -- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks -- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN -- Ubiquitous Compaction Monitoring Interface for Soil compactor - A Web Based Approach.
520 _aThis book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The book is based on the proceedings from the Fifth International Conference on Networks & Communications (NetCom). The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.
650 0 _aEngineering.
650 0 _aComputers.
650 0 _aElectrical engineering.
650 1 4 _aEngineering.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aInformation Systems and Communication Service.
650 2 4 _aElectrical Engineering.
700 1 _aMeghanathan, Natarajan.
_eeditor.
700 1 _aNagamalai, Dhinaharan.
_eeditor.
700 1 _aRajasekaran, Sanguthevar.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319036915
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1100 ;
_v284
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-03692-2
912 _aZDB-2-ENG
942 _cEBK
999 _c57054
_d57054