000 05438nam a22006375i 4500
001 978-3-030-22885-9
003 DE-He213
005 20240730164443.0
007 cr nn 008mamaa
008 190620s2019 sz | s |||| 0|eng d
020 _a9783030228859
_9978-3-030-22885-9
024 7 _a10.1007/978-3-030-22885-9
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aMobile, Secure, and Programmable Networking
_h[electronic resource] :
_b5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, Revised Selected Papers /
_cedited by Éric Renault, Selma Boumerdassi, Cherkaoui Leghris, Samia Bouzefrane.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXIII, 277 p. 134 illus., 102 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Communication Networks and Telecommunications,
_x2945-9184 ;
_v11557
505 0 _aDeep Generative Models for Image Generation: A Practical Comparison Between Variational Autoencoders and Generative Adversarial Networks -- A Game Stochastic Model for Data Dissemination Between Ferries and Cluster Head in Delay Tolerant Networks Routing Hierarchical Topology -- Delay-Bandwidth Optimization Method Based on Ant Colony Algorithm Applied to Transport Network Using SDN Paradigm -- CCN Context-Naming for Efficient Context-Aware Service Discovery in IoT -- Efficient Distributed Authentication and Access Control System Management for Internet of Things Using Blockchain -- Design of a New Patch Antenna Using EBG Structures and Superstarte Operating in the Ku-Band for 5G Cellular Networks -- A Data-Filtering Approach for Large-Scale Integrated RFID and Sensor Networks -- High Gain Metallic Electromagnetic Band Gap Antenna for WLAN Applications -- Toward Design of Advanced System-on-Chip Architecture for Mobile Computing Devices -- A Multiresolution-Based Fusion Strategy for Improving Speech Emotion Recognition Efficiency -- ECG Beat Classification Based on Stationary Wavelet Transform -- Cross-Subject EEG Signal Classification with Deep Neural Networks Applied to Motor Imagery -- Data Communication in Electromagnetic Nano-Networks for Healthcare Applications -- A Distributed Ensemble of Deep Convolutional Neural Networks with Random Forest for Big Data Sentiment Analysis -- Road Safety against Sybil Attacks Based on RSU Collaboration in VANET Environment -- A New Alert Message Dissemination Protocol for VANETs Based on LEACH Routing Protocol and Simulation in Random Waypoint Model Scenario -- Towards Semantic Integration of Heterogeneous Data Based on the Ontologies Modeling -- A Comparison Between MADM Methods and Utility Functions in the Network Selection Context -- A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection -- A New Mechanism to Secure IPv6 Networks Using Symmetric Cryptography -- Deep Neural Networksfor Indoor Localization Using WiFi Fingerprints -- A New Secure Cellular Automata Cryptosystem for Embedded Devices -- An ElGamal-like Digital Signature Based on Elliptic Curves. .
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. The 23 papers presented in this volume were carefully reviewed and selected from 48 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security. .
650 0 _aComputer networks .
_931572
650 0 _aComputers, Special purpose.
_946653
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aArtificial intelligence.
_93407
650 1 4 _aComputer Communication Networks.
_984582
650 2 4 _aSpecial Purpose and Application-Based Systems.
_946654
650 2 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aArtificial Intelligence.
_93407
700 1 _aRenault, Éric.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_984584
700 1 _aBoumerdassi, Selma.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_984585
700 1 _aLeghris, Cherkaoui.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_984587
700 1 _aBouzefrane, Samia.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_984589
710 2 _aSpringerLink (Online service)
_984593
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030228842
776 0 8 _iPrinted edition:
_z9783030228866
830 0 _aComputer Communication Networks and Telecommunications,
_x2945-9184 ;
_v11557
_984594
856 4 0 _uhttps://doi.org/10.1007/978-3-030-22885-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c85688
_d85688