Atnaujinkite slapukų nuostatas

Network Simulation and Evaluation: Second International Conference, NSE 2023, Shenzhen, China, November 22-24, 2023, Proceedings, Part I 2024 ed. [Minkštas viršelis]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formatas: Paperback / softback, 403 pages, aukštis x plotis: 235x155 mm, 110 Illustrations, color; 34 Illustrations, black and white; XVIII, 403 p. 144 illus., 110 illus. in color., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 2063
  • Išleidimo metai: 02-Aug-2024
  • Leidėjas: Springer Nature
  • ISBN-10: 9819745187
  • ISBN-13: 9789819745180
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 403 pages, aukštis x plotis: 235x155 mm, 110 Illustrations, color; 34 Illustrations, black and white; XVIII, 403 p. 144 illus., 110 illus. in color., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 2063
  • Išleidimo metai: 02-Aug-2024
  • Leidėjas: Springer Nature
  • ISBN-10: 9819745187
  • ISBN-13: 9789819745180
Kitos knygos pagal šią temą:
This book constitutes the refereed proceedings of the Second International Conference on Network Simulation and Evaluation, NSE 2023, held in Shenzhen, China in November 2023.





The 52 full papers presented in this two volume set were carefully reviewed and selected from 72 submissions. The papers are organized in the following topical sections:





 





CCIS 2063: Cybersecurity Attack and Defense, Cybersecurity Future Trends, Cybersecurity Infrastructure, Cybersecurity Systems and Applications.





CCIS 2064: Cybersecurity Threat Research, Design and Cybersecurity for IoT Systems, Intelligent Cyber Attack and Defense, Secure IoT Networks and Blockchain-Enabled Solutions, Test and Evaluation for Cybersecurity, Threat Detection and Defense.
.- Cybersecurity Attack and Defense.



.- Cybersecurity Future Trends.



.- Cybersecurity Infrastructure.



.- Cybersecurity Systems and Applications.



.- Cybersecurity Threat Research.



.- Design and Cybersecurity for IoT Systems.



.- Intelligent Cyber Attack and Defense.



.- Secure IoT Networks and Blockchain-Enabled Solutions.



.- Test and Evaluation for Cybersecurity.



.- Threat Detection and Defense.