Subject Catalog


Book Description




Tutorial


Book Description




Advances in Real-time Systems


Book Description










OpenFOAM®


Book Description

This book contains selected papers of the 11th OpenFOAM® Workshop that was held in Guimarães, Portugal, June 26 - 30, 2016. The 11th OpenFOAM® Workshop had more than 140 technical/scientific presentations and 30 courses, and was attended by circa 300 individuals, representing 180 institutions and 30 countries, from all continents. The OpenFOAM® Workshop provided a forum for researchers, industrial users, software developers, consultants and academics working with OpenFOAM® technology. The central part of the Workshop was the two-day conference, where presentations and posters on industrial applications and academic research were shown. OpenFOAM® (Open Source Field Operation and Manipulation) is a free, open source computational toolbox that has a larger user base across most areas of engineering and science, from both commercial and academic organizations. As a technology, OpenFOAM® provides an extensive range of features to solve anything from complex fluid flows involving chemical reactions, turbulence and heat transfer, to solid dynamics and electromagnetics, among several others. Additionally, the OpenFOAM technology offers complete freedom to customize and extend its functionalities.




Smart Trends in Computing and Communications


Book Description

This book gathers high-quality papers presented at the Fifth International Conference on Smart Trends in Computing and Communications (SmartCom 2021), organized by Global Knowledge Research Foundation (GR Foundation) from March 2 – 3 , 2021. It covers the state of the art and emerging topics in information, computer communications, and effective strategies for their use in engineering and managerial applications. It also explores and discusses the latest technological advances in, and future directions for, information and knowledge computing and its applications.




Distributed Denial of Service Attacks


Book Description

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.