Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > General (C.2.0)  
 
Options:
 
  1-10 of 663 Reviews about "General (C.2.0)": Date Reviewed
  Beginning AWS security: build secure, effective, and efficient AWS architecture
Penwell T., Apress, New York, NY, 2023. 152 pp.  Type: Book (148429680X)

Beginning AWS security: build secure, effective, and efficient AWS architecture is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services (AWS). This book is particularly valuable for ...

Mar 4 2024
  A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Tsao K., Girdler T., Vassilakis V. Ad Hoc Networks 1332022.  Type: Article

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to more established mobile ad hoc net...

Feb 8 2024
  Potential technologies and applications based on deep learning in the 6G networks
Zheng Z., Wang L., Zhu F., Liu L. Computers and Electrical Engineering 951-8, 2021.  Type: Article

The sixth generation of cellular networks (6G) still hasn’t reached its peak in terms of hype, and in light of 4G and 5G coordinates and ruling experiences, concerned theorists are working to define 6G’s framework, use cases, potential...

Apr 4 2023
   5G wireless: a comprehensive introduction
Stallings W., Pearson, Hoboken, NJ, 2021. 672 pp.  Type: Book (978-1-367671-41-6)

The tremendous growth of mobile technology from first generation (1G) to fifth generation (5G) includes the development of mobile networks, user interfaces, and real-time implementation. The COVID-19 pandemic of the last couple years highlighted a...

Sep 20 2022
  Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE
Li N., Yan Z., Wang M., Yang L. ACM Transactions on Cyber-Physical Systems 3(1): 1-23, 2018.  Type: Article

This paper looks at the crucial issues of security, user privacy, and communication integrity, inherent to the pervasive social networking (PSN) (a cyber-physical social system for nearby strangers) that spans self-organized heterogene...

Apr 28 2022
   Computer networks: a systems approach, sixth edition
Peterson L., Davie B., ACADEMIC PRESS, Cambridge, MA, 2021. 848 pp.  Type: Book (978-1-281820-08-2)

The field of computer science and engineering is advancing rapidly, especially in the area of computer networking. As the speed of networks increases, large amounts of data can be transferred at the speed of light. This makes more adva...

Apr 20 2022
   Computer networks and the Internet: a hands-on approach
Howser G., Springer International Publishing, New York, NY, 2020. 539 pp.  Type: Book (978-3-030344-95-5)

Most people in the developed world routinely use the Internet, but only a small minority understands the technologies on which its services depend. Howser provides a detailed description of these technologies, supported by practical ex...

Aug 17 2021
  Lightweight and informative traffic metrics for data center monitoring
Xu K., Wang F., Wang H. Journal of Network and Systems Management 20(2): 226-243, 2020.  Type: Article

Modern cloud computing data centers typically deliver virtualized services to tens of thousands of cloud users continuously, using hundreds or even thousands of commodity servers. Monitoring the availability, performance, and security ...

Aug 16 2021
  Securing and self recovery of virtual machines in cloud with an autonomic approach using snapshots
Joseph L., Mukesh R. Mobile Networks and Applications 24(4): 1240-1248, 2019.  Type: Article

Virtual machines (VMs) in the form of cloud computing are now mainstream for the delivery of information technology (IT) services. However, the environment in which these VMs run is complex and prone to malicious attack, potentially im...

Jun 17 2021
  Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation 29(4): 1-25, 2019.  Type: Article

Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations, and security researchers. What kinds of data and algorithms should be effectively used to monitor and thwart ris...

Mar 8 2021
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy