Advertisement

Mobile Networks and Management

9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings

  • Jiankun Hu
  • Ibrahim Khalil
  • Zahir Tari
  • Sheng Wen
Conference proceedings MONAMI 2017

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Efthimios Alepis, Constantinos Patsakis
    Pages 14-29
  3. Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay
    Pages 30-44
  4. Yanming Zhu, Xuefei Yin, Jiankun Hu
    Pages 56-65
  5. Xue Tian, Peisong Shen, Tengfei Yang, Chi Chen, Jiankun Hu
    Pages 66-78
  6. Rizza T. Loquias, Nestor Michael C. Tiglao, Jhoanna Rhodette I. Pedrasa, Joel Joseph S. Marciano
    Pages 87-100
  7. Xuefei Yin, Yanming Zhu, Jiankun Hu
    Pages 127-136
  8. Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin
    Pages 150-163
  9. Abdelaziz Bouras, Houssem Gasmi, Fadi Ghemri
    Pages 178-187
  10. Emna Baccour, Ala Gouissem, Sebti Foufou, Ridha Hamila, Zahir Tari, Albert Y. Zomaya
    Pages 188-202
  11. Hamid Usefi, Sudharaka Palamakumbura
    Pages 203-216
  12. Melchizedek I. Alipio, Nestor Michael C. Tiglao
    Pages 217-230
  13. Mouza Ahmed Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Hyun Ku Yeun, Yoon Seok Chang et al.
    Pages 231-246

About these proceedings

Introduction

This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017.
The 30 revised full papers were carefully reviewed and selected from 43 submissions. The papers handle topics in the area of mobile computing, wireless networking and management.

Keywords

data security Internet of Things (IoT) authentication cryptography artificial intelligence World Wide Web computer networks computer systems cloud computing semantics telecommunication networks computer crime wireless telecommunication systems industrial networks and applications network architecture fault detection and diagnosis security & privacy intrusion detection hardware forensics

Editors and affiliations

  • Jiankun Hu
    • 1
  • Ibrahim Khalil
    • 2
  • Zahir Tari
    • 3
  • Sheng Wen
    • 4
  1. 1.SEIT, UNSW CanberraCanberraAustralia
  2. 2.RMIT UniversityMelbourneAustralia
  3. 3.RMIT UniversityMelbourneAustralia
  4. 4.Swinburne University of TechnologyHawthorne, MelbourneAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-90775-8
  • Copyright Information ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-90774-1
  • Online ISBN 978-3-319-90775-8
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering