The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive
Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis.
The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Information System Design and Intelligent Applications (INDIA 2017) held at Duy Tan University, Da Nang, Vietnam during 15-17 June 2017. The book covers a wide range of topics of computer science and information technology discipline ranging from image processing, database application, data mining, grid and cloud computing, bioinformatics and many others. The various intelligent tools like swarm intelligence, artificial intelligence, evolutionary algorithms, bio-inspired algorithms have been well applied in different domains for solving various challenging problems.
Capitalize on Expert Foresight into the Future of Satellite Communication Satellite technology will maintain its key role in the evolving communications needs of government, military, IPTV, and mobile video industries because of its intrinsic multicast/broadcast capabilities, mobility aspects, global reach, reliability, and ability to quickly suppo
This innovative resource provides comprehensive coverage of the policies, practices, and guidelines needed to address the security issues related to today's wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems. It details the major mobile standards for securing mobile communications and examines architectures that can provide data confidentiality, authentication, integrity, and privacy in various wireless environments. The book defines the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure mobile communications are as secure as they are prolific.
Modern error control coding methods based on turbo coding have essentially solved the problem of reliable data communications over noisy channels. Contemporary Coding Techniques and Applications for Mobile Communications provides a clear, comprehensive, and practical grounding on the subject matter, examining the fundamentals, theory, and ap
Facilitating high data transfers over long distances at a reasonable cost, Carrier Ethernet is solidifying its fundamental position as the core of next-generation networks. Since it first dazzled the IT world 40 years ago with its ability to move data over local networks, Ethernet has dramatically evolved in both form and function. And now, Carrier
Over the last three decades, interest in Infrared (IR) technology as a medium to convey information has grown considerably. This is reflected by the increasing number of devices such as laptops, PDAs, and mobile phones that incorporate optical wireless transceivers and also by the increasing number of optical wireless links available for indoor and
A Complete Reference for the 21st Century Until recently, much of the communications technology in the former Eastern bloc countries was largely unknown. Due to the historically competitive nature of East/West relations, scientific groups operated independently, without the benefit of open communication on theoretical framework
The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distributio