<p>This book constitutes the thoroughly refereed post-conference proceedings of the ThirdΒ International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2017.</p> <p></p>The 17 papers presented in this volume were carefully reviewed and selected from 35 submi
Mobile, Secure, and Programmable Networking: First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papers
β Scribed by Selma Boumerdassi, Samia Bouzefrane, Γric Renault (eds.)
- Publisher
- Springer International Publishing
- Year
- 2015
- Tongue
- English
- Leaves
- 186
- Series
- Lecture Notes in Computer Science 9395
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Mobile, Secure, and Programmable Networking, MSPN 2015, held in Paris, France, in June 2015.
The 14 papers presented in this volume were carefully reviewed and selected from 36 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.
β¦ Table of Contents
Front Matter....Pages I-X
Adaptive and Flexible Virtual Honeynet....Pages 1-17
Analysis of Location Spoofing Identification in Cellular Networks....Pages 18-27
Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes....Pages 28-40
Graph- and Cloud-Based Tools for Computer Science Education....Pages 41-54
ERP Costumer Assistance Using Ubiquitous Agents....Pages 55-62
A Hybrid Algorithm for DAG Application Scheduling on Computational Grids....Pages 63-77
Toward Scheduling I/O Request of Mapreduce Tasks Based on Markov Model....Pages 78-89
Improving the Reliability and the Performance of CAPE by Using MPI for Data Exchange on Network....Pages 90-100
Wi-Fi Channels Saturation Using Standard Wi-Fi Gateway....Pages 101-108
Cloud Access Secure with Identity Based Cryptography....Pages 109-118
SDN-Based QoS Aware Network Service Provisioning....Pages 119-133
Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour....Pages 134-150
Analysis of Privacy and Security Exposure in Mobile Dating Applications....Pages 151-162
CBUPRE to Secure MANETs from DoS Attacks....Pages 163-175
Back Matter....Pages 177-177
β¦ Subjects
Computer Communication Networks; Information Systems Applications (incl. Internet); Information Storage and Retrieval; Software Engineering; Systems and Data Security; Communications Engineering, Networks
π SIMILAR VOLUMES
<p><p>This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conferenc
<p><p>This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Mobile, Secure, and Programmable Networking, held in Paris, France, in June 2018. </p><p>The 27 papers presented in this volume were carefully reviewed and selected from 52 submissi
<span>This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in October 2020.</span><p><span>The 16 full papers presented in this volume were carefully reviewed and selected f
<p><p>This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. </p><p>The 23 papers presented in this volume were carefully reviewed and selected from 48 su
<p>This book constitutes the refereed proceedings of the International Conference on Future Network Systems and Security, FNSS 2015, held in Paris, France, in June 2015.<br>The 13 full papers presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, comm