This volume of the Lecture Notes in computer Science series contains all papers accepted for presentation at the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM’99), whic...
详细信息
ISBN:
(数字)9783540481003
ISBN:
(纸本)9783540665984
This volume of the Lecture Notes in computer Science series contains all papers accepted for presentation at the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM’99), which took place at the ETH Zürich in Switzerland and was hosted by the computerengineering and Networking laboratory, TIK. DSOM’99 is the tenth workshop in a series of annual workshops, and Zürich is proud to host this 10th anniversary of the IEEE/IFIP workshop. DSOM’99 follows highly successful meetings, the most recent of which took place in Delaware, U.S.A. (DSOM'98), Sydney, Australia (DSOM'97), and L’Aquila, Italy (DSOM'96). DSOM workshops attempt to bring together researchers from the area of network and service management in both industry and academia to discuss recent advancements and to foster further growth in this ?eld. In contrast to the larger management symposia IM (In- grated Network Management) and NOMS (Network Operations and Management S- posium), DSOM workshops follow a single-track program, in order to stimulate interaction and active participation. The speci?c focus of DSOM’99 is “Active Technologies for Network and Service Management,” re?ecting the current developments in the ?eld of active and program- ble networks, and about half of the papers in this workshop fall within this category.
Emerging transportation technologies, including electric vehicles (EVs), autonomous vehicles (AVs), and connected vehicles (CVs), are poised to revolutionize mobility and logistics through advancements in connectivity...
详细信息
Emerging transportation technologies, including electric vehicles (EVs), autonomous vehicles (AVs), and connected vehicles (CVs), are poised to revolutionize mobility and logistics through advancements in connectivity, automation, and electrification. However, the convergence of these systems introduces substantial cybersecurity challenges, including data breaches, spoofing, and infrastructure attacks, due to increasingly complex and interconnected attack surfaces. This paper presents a comprehensive survey of cybersecurity threats, vulnerabilities, and evaluation practices within the AV, CV, and EV landscape. We analyze 227 peer-reviewed studies published between 2021 and 2025 and introduce two novel taxonomies: a three-stage cyber-attack lifecycle framework—Stream to Information (S2I), Information to Decision (I2D), and Decision to Actuation (D2A)—and eleven representative attack paths. Our findings reveal that the stream and data processing stages are most frequently exploited, with limited standardization in evaluation metrics and inadequate emphasis on real-world operational consequences. We highlight the growing importance of integrating quantum-safe cryptography and AI-driven anomaly detection as proactive defense mechanisms. Finally, we offer stage-wise design recommendations and identify future research directions, including the need for cross-domain evaluation frameworks, cyber-social risk assessments, and secure integration of emerging multi-modal systems. This survey aims to support policymakers, researchers, and industry stakeholders in developing resilient, secure, and trustworthy next-generation road transportation ecosystems.
This book constitutes the refereed proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2012, held in Málaga, Spain, in April 2012, colocated with the Evo* ...
详细信息
ISBN:
(数字)9783642291784
ISBN:
(纸本)9783642291777
This book constitutes the refereed proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2012, held in Málaga, Spain, in April 2012, colocated with the Evo* 2012 events EuroGP, EvoCOP, EvoBIO, and EvoMUSART. The 54 revised full papers presented were carefully reviewed and selected from 90 submissions. EvoApplications 2012 consisted of the following 11 tracks: EvoCOMNET (nature-inspired techniques for telecommunication networks and other parrallel and distributed systems), EvoCOMPLEX (algorithms and complex systems), EvoFIN (evolutionary and natural computation in finance and economics), EvoGAMES (bio-inspired algorithms in games), EvoHOT (bio-inspired heuristics for design automation), EvoIASP (evolutionary computation in image analysis and signal processing), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoRISK (computational intelligence for risk management, security and defense applications), EvoSTIM (nature-inspired techniques in scheduling, planning, and timetabling), and EvoSTOC (evolutionary algorithms in stochastic and dynamic environments).
This volume of the Lecture Notes in computer Science series contains the set of papers accepted for publication at the colocated QofIS/ICQT 2002 workshops, i.e. the 3rd COST Action 263 International Workshop on Qualit...
详细信息
ISBN:
(数字)9783540458593
ISBN:
(纸本)9783540443568
This volume of the Lecture Notes in computer Science series contains the set of papers accepted for publication at the colocated QofIS/ICQT 2002 workshops, i.e. the 3rd COST Action 263 International Workshop on Quality of future Internet Services (QofIS) and the 2nd International Workshop on Internet Charging and QoS Technology (ICQT), both of which took place at the ETH Zric h, Switzerland, hosted by the computerengineering and Networking laboratory, TIK. QofIS 2002 was the third in a series of highly successful technical workshops and meetings on Internet services within the framework of the COST Action 263 Q uality of future Internet Services , following previous events in Berlin, Germany in 2000 and in Coimbra, Portugal in 2001. ICQT 2002 was the follow-up to a vivid and extremely well-attended workshop on Internet economics and charging technology that took place within the framework of the Annual Meeting of the German Society for computer Science (GI) and the Austrian computer Society in 2001 in Vienna, Austria.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of appl...
详细信息
ISBN:
(数字)9783030054113
ISBN:
(纸本)9783030054106
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex networks and their Applications (COMPLEX networks 2018), which was held in Cambridge on December 11–13, 2018. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure and network dynamics; diffusion, epidemics and spreading processes; and resilience and control; as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks; and technological networks.
This book constitutes the refereed proceedings of the 4th International Workshop on Self-Organizing Systems, IWSOS 2009, held in Zurich, Switzerland, in December 2009. The 14 revised full papers and 13 revised short p...
详细信息
ISBN:
(数字)9783642108655
ISBN:
(纸本)9783642108648
This book constitutes the refereed proceedings of the 4th International Workshop on Self-Organizing Systems, IWSOS 2009, held in Zurich, Switzerland, in December 2009. The 14 revised full papers and 13 revised short papers presented were carefully selected from the 34 full and 27 short paper submissions. The papers are organized in topical sections on ad hoc and sensor networks; services, storage, and internet routing; peer-to-peer systems; theory and general approaches; overlay networks; peer-to-peer systems and internet routing; wireless networks; and network topics.
The 2010 edition of the Passive and Active Measurement Conference was the 11th of a series of successful events. Since 2000, the Passive and Active M- surement (PAM) conference has provided a forum for presenting and ...
详细信息
ISBN:
(数字)9783642123344
ISBN:
(纸本)9783642123337
The 2010 edition of the Passive and Active Measurement Conference was the 11th of a series of successful events. Since 2000, the Passive and Active M- surement (PAM) conference has provided a forum for presenting and discussing innovative and early work in the area of Internet measurements. PAM has a tradition of being a workshop-like conference with lively discussion and active participation from all attendees. This event focuses on research and practical applications of network measurement and analysis techniques. This year’s c- ference was held at ETH Zurich, Switzerland. PAM 2010 attracted 79 submissions. Each paper was carefully reviewed by at *** ***- ering the following areas: routing, transport protocols, mobile devices, topology, measurement infrastructure, characterizing network usage, analysis techniques, tra?c analysis, and the Web. We are very grateful to Endace Ltd. (New Zealand), Cisco Systems Inc. (USA), armasuisse (Switzerland) and the COST Action TMA whose sponsoring allowedustokeepregistrationcostslowandto o?erseveraltravelgrantsto PhD students. We are also grateful to ETH Zurich for sponsoring PAM as a host.
暂无评论