Modeling and Tools for Network SimulationThis book focuses on tools, modeling principles and state-of-the art models for discrete-event based network simulations, the standard method applied today in academia and industry for performance evaluation of new network designs and architectures. The book is aimed at master students and PhD students of computer science and electrical engineering as well as at researchers and practitioners from academia and industry that are dealing with network simulation at any layer of the protocol stack. |
Peer-to-Peer Systems and ApplicationsWithin just a few years, the huge popularity of peer-to-peer systems and the explosion of peer-to-peer research have created a large body of knowledge, but this book is the first textbook-like survey to provide an up-to-date and in-depth introduction to the field. |
Linux Networking ArchitectureThis unique Linux networking tutorial/reference by experts provides readers with a practical overview and understanding of the implementation of networking protocols in the Linux kernel. The book shows how networking behavior and protocols can be implemented within the Linux operating system. The book provides an introduction to the Linux kernel, mainly focusing on the kernel version 2.4 but also valid for version 2.2 kernels. The organization of the book follows the TCP/IP layering model, beginning with the kernel's network device drivers, continuing with link-layer protocols such as PPP, and finally giving a description of all core protocols of the TCP/IP protocol family. Additional supplementary protocols such as RSVP, IP Security, and Mobile IP are also covered. |
Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and ApplicationsHoubing Song, Glenn A. Fink, Sabina Jeschke (Eds.) Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. Chapter 2 by COMSYS Security and Privacy team:Chapter 2: Network Security and Privacy for Cyber-Physical Systems | |
Trusted Cloud ComputingHelmut Krcmar, Ralf Reussner, Bernhard Rumpe (Eds.) Covers fundamental aspects of trust, security, and quality of service for cloud-based services. Chapters 6 and 13 with contributions from COMSYS:Chapter 6: A Trust Point-based Security Architecture for Sensor Data in the Cloud Chapter 13: SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators |
Host Identity Protocol (HIP): Towards the Secure Mobile InternetAndrei Gurtov Text book and state of the art survey covering background, core, and applications of the Host Identity Protocol (HIP). Chapters 2 and 8 by Tobias Heer:Chapter 2: Introduction to network security. Chapter 8: Lightweight HIP. |
2013 4th International Workshop on Software Engineering for Sensor Network Applications (SESENA 2013)
more Information at IEEE Xplore |
The 8th International Conference on Peer-to-Peer Computing (P2P'08)
more Information at IEEE Xplore |
The 7th International Conference on Peer-to-Peer Computing (P2P'07)
more Information at IEEE Xplore |
ACM SIGCOMM Workshop on Models, Methods and Tools for Reproducible Network Research
|
Quality of Service / IWQoS 2003 -- 11th International Workshop, Berkeley, California, USA
Order book at amazon.com |