Search
Search Results
-
Capturing Secured Application Traffic for Analysis
Following the famous adage that goes “Necessity is the mother of any invention,” securing end-to-end traffic is an evolution happening for the past... -
Optimizing APIs
You now know how to develop endpoints, architect your applications, and access data efficiently. That’s all very well, but you can go even further. I... -
Investigating the Overhead of the REST Protocol When Using Cloud Services for HPC Storage
With the significant advances in Cloud Computing, it is inevitable to explore the usage of Cloud technology in HPC workflows. While many Cloud... -
Controlling Network Traffic Microstructures for Machine-Learning Model Probing
Network intrusion detection (NID) models increasingly rely on learning traffic microstructures that consist of pattern sequences in features such as... -
Analysis of QUIC Session Establishment and Its Implementations
In the recent years, the major web companies have been working to improve the user experience and to secure the communications between their users... -
Introduction to Cyber-Physical Systems
This chapter begins with an overview of cyber-physical systems in Sect. 3.1 taking into account the introduction to systems in Chap.... -
Social Impact on Work Lives of the Future
This chapter is a brief introduction to the social impact on the work lives of the future. Section 8.1 introduces the changes in manufacturing skills... -
Systems and Software Engineering
This chapter begins with a brief introduction to systems engineering in Sect. 6.1, which describes systems engineering as an interdisciplinary field... -
Ubiquitous Computing
This chapter begins with a brief overview of ubiquitous computing. Section 5.1 defines ubiquitous computing and illustrates some of its applications.... -
Digital Manufacturing/Industry 4.0
This chapter begins with a brief introduction to manufacturing in Sect. 7.1, identifying the enabling technologies and opportunities with regard to... -
A Novel Network Traffic Analysis Method Based on Fuzzy Association Rules
For network traffic analysis and forecasting, a novel method based on fuzzy association rules is proposed in this paper. Connecting fuzzy logic... -
Socket Programming
The Windows Sockets specification describes a common interface for networked Windows programs. WinSock uses TCP/IP communications and provides for... -
Socket programming
The Windows Sockets specification describes a common interface for networked Windows programs. WinSock uses TCP/IP communications and provides for... -
Miscellaneous
In addition to the basic architectural concepts described in the main chapters of this book, many additional technologies and concepts for the web... -
On the Integration of Legacy Information Servers into the World-Wide Web
Today we see the synergy of two technologies: databases and networking. Tomorrows global information systems will integrate network technology and...