This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV.
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Ne...
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information.Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network...
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from cov...
This illuminating text/reference reviews the fundamentals of programming for effective DataFlow computing. The DataFlow paradigm enables considerable increases in speed and reductions in power consumption for supercomputing processes, yet the programming model requires a distinctly different approach. The algorithms and examples showcased in this book will help the reader to develop their understanding of the advantages and unique features of this methodology.
This work serves as a companion title to DataFlow Supercomputing Essentials: Research, Development and Education, which...
This illuminating text/reference reviews the fundamentals of programming for effective DataFlow computing. The DataFlow paradigm enables considerable ...
This informative text/reference highlights the potential of DataFlow computing in research requiring high speeds, low power requirements, and high precision, while also benefiting from a reduction in the size of the equipment. The cutting-edge research and implementation case studies provided in this book will help the reader to develop their practical understanding of the advantages and unique features of this methodology.
This work serves as a companion title to DataFlow Supercomputing Essentials: Algorithms, Applications and Implementations, which reviews the key algorithms...
This informative text/reference highlights the potential of DataFlow computing in research requiring high speeds, low power requirements, and high ...
introduces a mobile IoT simulator designed to evaluate the behavior of IoT systems, in addition to a novel approach to manage hyper-connectivity in the IoT;
introduces a mobile IoT simulator designed to evaluate the behavior of IoT systems, in addition to a novel approach to manage hyper-connectivity in th...
The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs).
The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues ...
It then examines the different machine learning techniques that are useful for data analytics, and how to visualize data with different graphs and charts. Presenting data analytics from a practice-oriented viewpoint, the book discusses useful tools and approaches for data analytics, supported by concrete code examples.
It then examines the different machine learning techniques that are useful for data analytics, and how to visualize data with different graphs and cha...