The book consists of peer reviewed and presented papers of the 2nd International Conference on Cloud Computing and Computer Network (CCCN 2024), which took place in Singapore during April 19-21, 2024. The conference is held annually to gather scholars, researchers and engineers working in the field of cloud computing to share their newest research findings and results, discuss and exchange their thoughts and information, and learn about cutting-edge technologies. The papers are solicited on a broad range of topics, including cloud computing and semantic web technologies, cloud computing models, simulations and designs, cloud computing applications, cloud computing services, mobile cloud networking, service-oriented architecture in cloud computing. Case studies and theories in cloud computing are also explored, as well as cloud storage and file systems, Blockchain for emerging networks, network management, measurement and analysis, and network virtualization.
Inhaltsverzeichnis
Part I: Computer Networks and Information Security. - Chapter 1: Convolutional Dictionary Super-resolution Network for Removing CT Metal Artifacts. - Chapter 2: Information and Communication Technology (ICT) based Temperature Monitoring for Cold Chain Management in Immunization Information System. - Chapter 3: Detecting the Unknown: Evaluating the Efficacy of Host-based Intrusion Detection Systems (IDS) in Zero-day Attacks. - Chapter 4: Performance Evaluation of Security Mechanisms for Erasure coded System in Hadoop. - Part II: Mobile Communication and Wireless Technology. - Chapter 5: Genetic Algorithms for Solving the Demand Clustering and Spectrum Allocation Problem. - Chapter 6: Virtual scan based approach for coverage hole detection in Wireless Sensor Networks. - Chapter 7: Multi-hash Chain Based Key Pre-distribution for Wireless Sensor Networks. - Part III: Mobile Applications and Data Security. - Chapter 8: An In-Depth Penetration Testing Study in Evaluating Bluetooth Vulnerabilities and Related Attacks in Smartphones. - Chapter 9: Kadiwa Anyware: A Mobile App Facilitating Produce Exchange Through Blockchain Integration. - Chapter 10: Bluetooth Simulated Reconnaissance Attack Through the use of HCITool: A Case Study.
Es wurden noch keine Bewertungen abgegeben. Schreiben Sie die erste Bewertung zu "2nd International Conference on Cloud Computing and Computer Networks" und helfen Sie damit anderen bei der Kaufentscheidung.