Document Type
|
:
|
BL
|
Record Number
|
:
|
859396
|
Main Entry
|
:
|
NEW2AN (Conference)(18th :2018 :, Saint Petersburg, Russia)
|
Title & Author
|
:
|
Internet of things, smart spaces, and next generation networks and systems : : 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27-29, 2018, Proceedings /\ Olga Galinina, Sergey Andreev, Sergey Balandin, Yevgeni Koucheryavy (eds.).
|
Publication Statement
|
:
|
Cham, Switzerland :: Springer,, 2018.
|
Series Statement
|
:
|
Lecture notes in computer science ;; 11118
|
|
:
|
LNCS sublibrary. SL 5, Computer communication networks and telecommunications
|
Page. NO
|
:
|
1 online resource (xvi, 705 pages) :: illustrations.
|
ISBN
|
:
|
3030011682
|
|
:
|
: 3030011690
|
|
:
|
: 9783030011680
|
|
:
|
: 9783030011697
|
|
:
|
3030011674
|
|
:
|
9783030011673
|
Notes
|
:
|
Includes author index.
|
|
:
|
International conference proceedings.
|
Contents
|
:
|
Intro -- Preface -- Organization -- Contents -- ruSMART: New Generation of Smart Services -- Requirements for Energy Efficient Edge Computing: A Survey -- Abstract -- 1 Introduction -- 2 Definition of Edge and Fog -- 3 Benefits of the Edge Computing -- 4 Edge and Fog Computing Challenges -- 4.1 Methods for Reducing Energy Consumption in Wireless Sensor Networks -- 4.2 Data Compression Methods in Edge Device: Lossy and Lossless Methods -- 5 Wireless Technologies for Energy Efficient IoT -- 6 Energy Efficient IoT Protocols -- 7 Security and Privacy Issues in the Edge -- 8 Conclusions
|
|
:
|
4 Stakeholders and Assets -- 5 Conclusions -- References -- State of the Art Literature Review on Network Anomaly Detection with Deep Learning -- 1 Introduction -- 2 Network Anomaly Detection with Deep Learning -- 2.1 Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks -- 2.2 DeepDefense: Identifying DDoS Attack via Deep Learning -- 2.3 Network Anomaly Detection Using Artificial Neural Networks -- 2.4 Network Anomaly Detection with Stochastically Improved Autoencoder Based Models -- 2.5 An Anomaly-Based Network Intrusion Detection System Using Deep Learning
|
|
:
|
5 Sample Scenarios and Testing -- 6 Conclusion -- Acknowledgements -- References -- An Artificial Intelligence Based Forecasting in Smart Parking with IoT -- Abstract -- 1 Introduction -- 2 Related Work -- 3 AI Genetic Algorithm for SC Generated Parking Data -- 3.1 IoT Generated Data at the SC Parking Places -- 3.2 Incorporated Evaluation Real Datasets -- 3.3 Genetic Algorithm -- 3.4 AI Experimental Results -- 4 AI Recurrent Neural Networks (RNN) and Data Forecasting -- 4.1 Incorporating AI RNN -- 4.2 Data Preparation -- 4.3 Learning on Datasets -- 5 Decision System -- 5.1 Car System and Use Case
|
|
:
|
5.2 Finding the Best Parking Lot Through the Prediction System -- 6 Conclusions and Future Work -- Acknowledgments -- References -- On Data Stream Processing in IoT Applications -- Abstract -- 1 Introduction -- 2 On Streams-Based Architectures -- 3 IoT Applications and Streams -- 4 On Streams-Based Algorithms -- 5 Conclusion -- Acknowledgement -- References -- Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture -- 1 Introduction -- 2 Place of Assets in Threat Risk Model -- 3 Architecture of IoT -- 3.1 Classical IoT Architecture -- 3.2 Avatar-Oriented IoT Architecture
|
Abstract
|
:
|
This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018. The 64 revised full papers presented were carefully reviewed and selected from 186 submissions. The papers of NEW2AN focus on advanced wireless networking and applications; lower-layer communication enablers; novel and innovative approaches to performance and efficiency analysis of ad-hoc and machine-type systems; employed game-theoretical formulations, Markov chain models, and advanced queuing theory; grapheme and other emerging material, photonics and optics; generation and processing of signals; and business aspects. The ruSMART papers deal with fully-customized applications and services.
|
Subject
|
:
|
Internet of things, Congresses.
|
Subject
|
:
|
Wireless communication systems, Congresses.
|
Subject
|
:
|
Coding theory cryptology.
|
Subject
|
:
|
Communications engineering-- telecommunications.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computers-- Hardware-- Handheld Devices.
|
Subject
|
:
|
Computers-- Hardware-- Network Hardware.
|
Subject
|
:
|
Computers-- Information Technology.
|
Subject
|
:
|
Computers-- Information Theory.
|
Subject
|
:
|
Computers-- Security-- General.
|
Subject
|
:
|
Information retrieval.
|
Subject
|
:
|
Internet of things.
|
Subject
|
:
|
Network hardware.
|
Subject
|
:
|
Systems analysis design.
|
Subject
|
:
|
Technology Engineering-- Telecommunications.
|
Subject
|
:
|
Wireless communication systems.
|
Subject
|
:
|
Computer Communication Networks.
|
Subject
|
:
|
Coding and Information Theory.
|
Subject
|
:
|
Communications Engineering, Networks.
|
Subject
|
:
|
Information Systems Applications (incl. Internet).
|
Subject
|
:
|
System Performance and Evaluation.
|
Subject
|
:
|
Systems and Data Security.
|
Dewey Classification
|
:
|
004.67/8
|
LC Classification
|
:
|
QA76.5915
|
Added Entry
|
:
|
Andreev, Sergey
|
|
:
|
Balandin, Sergeĭ I.
|
|
:
|
Galinina, Olga
|
|
:
|
Koucheryavy, Yevgeni
|
Added Entry
|
:
|
Conference on Smart Spaces(11th :2018 :, Saint Petersburg, Russia)
|
Parallel Title
|
:
|
NEW2AN 2018
|
|
:
|
: RuSMART 2018
|