Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network…mehr
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets.
Presenting secure and scalable solutions that can detect malicious behaviors in the networkin a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
Yuxiang Ma is an Associate Professor with the School of Computer and Information Engineering, Henan University. He received his B.S. degree in Network Engineering from Henan University in 2013 and his Ph.D. degree in Computer Architecture from the Computer Network Information Center, Chinese Academy of Sciences, in 2019. His research interests include computer network architectures and protocols, network security, and privacy enhancement technologies. He has published over 10 research papers. Yulei Wu is a Senior Lecturer with the Department of Computer Science, College of Engineering, Mathematics and Physical Sciences, University of Exeter, UK. He received his B.Sc. degree (1st Class Hons.) in Computer Science and his Ph.D. degree in Computing and Mathematics from the University of Bradford, UK, in 2006 and 2010, respectively. His expertise is on networking, and his main research interests include computer networks, networked systems, software-defined networks and systems, network management, and network security and privacy. Dr. Wu contributes to major conferences on networking and networked systems as various roles, including Steering Committee Chair, General Chair, and Program Chair. His research has been supported by Engineering and Physical Sciences Research Council of UK, National Natural Science Foundation of China, and University's Innovation Platform and industry. He is an Editor of IEEE Transactions on Network and Service Management, Computer Networks (Elsevier), and IEEE Access. He is a Senior Member of the IEEE and a Fellow of the HEA (Higher Education Academy). Jingguo Ge is currently a Professor at the Institute of Information Engineering, Chinese Academy of Sciences, and at the School of Cyber Security, University of the Chinese Academy of Sciences. He received his Ph.D. degree in Computer System Architecture from the Institute of Computing Technology, Chinese Academy of Sciences, in 2003.His research interests include computer network architectures, software-defined networks, network virtualization, cybersecurity, and mobile communication networks.
Inhaltsangabe
Introduction.- A Comprehensive Survey.- Encrypted Traffic Classification.- A Content-based Architecture.- A Flow-based Architecture.- A Service-based Architecture.- An Information-Centric Networking based Architecture.- Summary.
Introduction.- A Comprehensive Survey.- Encrypted Tra c Classification.- A Content-based Architecture.- A Flow-based Architecture.- A Service-based Architecture.- An Information-Centric Networking based Architecture.- Summary.
Introduction.- A Comprehensive Survey.- Encrypted Traffic Classification.- A Content-based Architecture.- A Flow-based Architecture.- A Service-based Architecture.- An Information-Centric Networking based Architecture.- Summary.
Introduction.- A Comprehensive Survey.- Encrypted Tra c Classification.- A Content-based Architecture.- A Flow-based Architecture.- A Service-based Architecture.- An Information-Centric Networking based Architecture.- Summary.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497