دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Miguel Félix Mata-Rivera, Roberto Zagal-Flores, Cristian Barria-Huidobro سری: ISBN (شابک) : 9789811596087, 9789811596094 ناشر: Springer سال نشر: 2020 تعداد صفحات: 193 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 18 مگابایت
در صورت تبدیل فایل کتاب Telematics and Computing: 9th International Congress, WITCOM 2020, Puerto Vallarta, Mexico, November 2–6, 2020, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تله ماتیک و محاسبات: نهمین کنگره بین المللی، WITCOM 2020، پورتو والارتا، مکزیک، 2 تا 6 نوامبر 2020، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Organization Contents Mobile Internet Security Aggregate Authentication for Massive Internet of Things in 5G Networks 1 Introduction 2 Overview of Aggregate Authentication Protocol for Massive IoT 3 Analysis of the Existing Aggregate Signature Schemes for Massive IoT Devices 4 Research Challenges 5 Conclusions References EAP-Based Bootstrapping for Secondary Service Authentication to Integrate IoT into 5G Networks 1 Introduction 2 Related Work 3 Proposed Architecture 4 Interactions Description 5 Use Cases in IoT and 5G Networks 6 Conclusion References LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server 1 Introduction 2 Preliminary 2.1 LoRaWAN Architecture and Its Security Scheme 2.2 Related Studies 3 Secure Communication Method for LoRaWAN Servers 3.1 Key Generation Procedure 3.2 Key Renew Procedure 4 Security Analysis 5 Conclusion and Future Studies References Role Mining: Survey and Suggestion on Role Mining in Access Control 1 Introduction 2 Status of Development of Role Mining 2.1 Researches on Extended Elements of Role Mining Mechanism 2.2 Improvement of Role Mining Mechanism 3 Performance Evaluation Metrics of Role Mining Mechanisms 4 Open Issue and Challenge 4.1 Minimizing the Role Set Problem 4.2 RBAC Migration Cost Problem 4.3 Role Mining Problem with Semantic Information 4.4 Role Mining Results Evaluation Criteria 5 Conclusion References Mobile Application and Security Adaptive Touch Interface: Application for Mobile Internet Security 1 Introduction 2 State of the Art: Usability Approaches 3 Adaptation Technique 4 Implementation 5 Discussion 6 Conclusion References Power-Efficient Big.LITTLE Core Assignment Scheme for Task Graph Based Real-Time Smartphone Applications 1 Introduction 2 Related Work 3 System Model 4 Power Efficient Multi-core Assignment Algorithms 4.1 Meeting the Deadline of Each Task 4.2 Meeting the Deadline of the Application 5 Performance Evaluation 5.1 Experiment Setup 5.2 Experiment Result 6 Discussion of Energy-Aware Security Issues 7 Conclusion and Future Works References A Hidden File Extraction Scheme Defeating Malware Using Android Dynamic Loading 1 Introduction 2 Background 2.1 Java Reflection 2.2 Dynamic Analysis 2.3 Xposed 3 Related Works 3.1 APK Reverse Engineering 3.2 API Hiding Technique 4 Proposed Scheme and Implementation 4.1 Dynamic Loading API and Java Reflection 4.2 Hook with Magisk and EdXposed 4.3 File Extraction Algorithms 5 Evaluation 5.1 Performance Result 6 Limitation 7 Conclusion References Reduction of Data Leakage Using Software Streaming 1 Introduction 2 Related Work 3 System Architecture 3.1 Network Multi-channel for Software Streaming 3.2 Symbolic Execution 3.3 Network Scheduling for Software Streaming 4 Implementation 5 Future Works 6 Conclusion References Digital Watermarking for Enriched Video Streams in Edge Computing Architectures Using Chaotic Mixtures and Physical Unclonable Functions 1 Introduction 2 State of the Art 3 A New Authentication Method Based on Digital Watermarking 3.1 Digital Watermarking 3.2 Watermark Generation Through Chaotic Mixtures 3.3 Secret Key Generation Using PUF 4 Experimental Validation: Simulation Results 5 Conclusions and Future Works References Vehicular Network Security Improved Security Schemes for Efficient Traffic Management in Vehicular Ad-Hoc Network 1 Introduction 2 Literature Survey 3 VANET Infrastructure 3.1 Characteristics and Applications of VANET 3.2 Implementation Challenges and Security Issues of VANET 4 Proposed Model: Traffic Congestion (TraCo) Estimation Using Video Image Processing with VANET (VIMPROS-V) Infrastructure 4.1 Need for Video Image Processing Based Infrastructure in VANET (VIMPROS-V) 4.2 Infrastructure Decision Scheme for TraCo Estimation 4.3 Parameter Estimation for TraCo Application Using VIMPROS-V 4.4 TraCo Estimation Using Fuzzy Logic 4.5 VIMPROS-V in VANET Security 5 Simulation and Result Analysis 6 Conclusion References Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model 1 Introduction 2 Related Work 2.1 Semi-natural Modeling 2.2 Simulation Modeling 2.3 Analytical Modeling 2.4 Analytical-Simulation Modeling 3 Domain Description 4 Integrated Approach 4.1 Component-Based Approach 4.2 Semi-natural Model 4.3 Simulation Model 4.4 Analytical Model 4.5 Attacker Model 5 Attack Surface 6 Experiments 7 Conclusion References Deep Learning Applications Improved Collaborative Filtering Algorithm Based on Stacked Denoising AutoEncoders 1 Introduction 2 Preliminaries 2.1 Autoencoder 2.2 Denoising AutoEncoder 2.3 Stacked Denoising AutoEncoder 3 The Proposed Algorithm 3.1 User Similarity Calculation 3.2 Item Similarity Calculation 3.3 Prediction of Comprehensive Score 4 Experiments and Analysis 4.1 Datasets 4.2 Evaluation Goal 4.3 Results Analysis 5 Conclusion and Future Studies References End-to-End 3D Face Model Reconstruction Method Based on Fusion-CNN 1 Introduction 2 Preliminaries 2.1 3D Morphable Model 2.2 E2FAR 3 The Proposed Method 3.1 Neural Network Architecture 3.2 Loss Function 4 Experiment and Analysis 4.1 Dataset 4.2 Training Process 4.3 Performance Analysis 5 Conclusions and Future Studies References Author Index