Buch, Englisch, 146 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 405 g
CCCN 2024
Buch, Englisch, 146 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 405 g
Reihe: Signals and Communication Technology
ISBN: 978-3-031-78130-8
Verlag: Springer Nature Switzerland
The book consists of peer reviewed and presented papers of the 2nd International Conference on Cloud Computing and Computer Network (CCCN 2024), which took place in Singapore during April 19-21, 2024. The conference is held annually to gather scholars, researchers and engineers working in the field of cloud computing to share their newest research findings and results, discuss and exchange their thoughts and information, and learn about cutting-edge technologies. The papers are solicited on a broad range of topics, including cloud computing and semantic web technologies, cloud computing models, simulations and designs, cloud computing applications, cloud computing services, mobile cloud networking, service-oriented architecture in cloud computing. Case studies and theories in cloud computing are also explored, as well as cloud storage and file systems, Blockchain for emerging networks, network management, measurement and analysis, and network virtualization.
- Presents papers from the International Conference on Cloud Computing and Computer Network (CCCN 2024)
- Includes topics such as semantic web technologies, cloud applications, and cloud computing architecture
- Relevant to academics, researchers, students, and professionals in cloud computing and computer networks
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Part I: Computer Networks and Information Security.- Chapter 1: Convolutional Dictionary Super-resolution Network for Removing CT Metal Artifacts.- Chapter 2: Information and Communication Technology (ICT) based Temperature Monitoring for Cold Chain Management in Immunization Information System.- Chapter 3: Detecting the Unknown: Evaluating the Efficacy of Host-based Intrusion Detection Systems (IDS) in Zero-day Attacks.- Chapter 4: Performance Evaluation of Security Mechanisms for Erasure coded System in Hadoop.- Part II: Mobile Communication and Wireless Technology.- Chapter 5: Genetic Algorithms for Solving the Demand Clustering and Spectrum Allocation Problem.- Chapter 6: Virtual scan based approach for coverage hole detection in Wireless Sensor Networks.- Chapter 7: Multi-hash Chain Based Key Pre-distribution for Wireless Sensor Networks.- Part III: Mobile Applications and Data Security.- Chapter 8: An In-Depth Penetration Testing Study in Evaluating Bluetooth Vulnerabilities and Related Attacks in Smartphones.- Chapter 9: Kadiwa Anyware: A Mobile App Facilitating Produce Exchange Through Blockchain Integration.- Chapter 10: Bluetooth Simulated Reconnaissance Attack Through the use of HCITool: A Case Study.