Computer Networks and Inventive Communication Technologies: Proceedings of Fifth ICCNCT 2022 (Lecture Notes on Data Engineering and Communications Technologies, 141)
Computer Networks and Inventive Communication Technologies: Proceedings of Fifth ICCNCT 2022 (Lecture Notes on Data Engineering and Communications Technologies, 141)
This book is a collection of peer-reviewed best selected research papers presented at 5th International Conference on Computer Networks and Inventive Communication Technologies . The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference is a valuable resource, dealing with both the important core and the specialized issues in the areas of next generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advance work in the area.
Language
English
Pages
938
Format
Paperback
Release
October 14, 2022
ISBN 13
9789811930348
Computer Networks and Inventive Communication Technologies: Proceedings of Fifth ICCNCT 2022 (Lecture Notes on Data Engineering and Communications Technologies, 141)
This book is a collection of peer-reviewed best selected research papers presented at 5th International Conference on Computer Networks and Inventive Communication Technologies . The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference is a valuable resource, dealing with both the important core and the specialized issues in the areas of next generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advance work in the area.