The aim of the book is to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.
Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence, and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure, and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next-generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design, and applications of computer networks, distributed computing, and information systems.
สารบัญ
The Deployment of E-Learning Application as a Web Service in a Cloud Broker Architecture.- Carbon App: Blockchain Enabled Carbon Offset Project Management.- Investigating the Impact of Congestion Control Algorithms on Edge-Cloud Continuum.- Design and Implementation of a Fuzzy-based System for Assessment of Relationship Trust.- Barong Trace: A Malware Event Log Dataset for Linux.- Specifying SSI over EAP: Towards an Even Better Eduroam in the Future.- Fast SGX: A Message-passing based Runtime for SGX.- Leveraging Chat-Based Large Vision-Language Models for Multimodal Out-of-Context Detection.- Enhancing the 5G-AKA Protocol with Post-Quantum Digital Signature Method.- So K: Directions and Issues in Formal Verification of Payment Protocols.- PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNN.- Design and Performance Evaluation of a Two-stage Detection of DDo S Attacks Using a Trigger with a Feature on Riemannian Manifolds.- Discovering Personally Identifiable Information in Textual Data – A Case Study with Automated Concatenation of Embeddings.- Towards User-Oriented Steganography.- AI-based Cybersecurity Systems.