Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting…mehr
Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.
-1. Group Testing (Introduction, Basic Theory and Design, Applications in Network Security). -2.Size Constraint Group Testing and DoS Attacks (Overview, Network System Models, Size Constraint Group Testing, Matrix Construction and Latency Analyses, Detection System Configuration, Experimental Analysis). -3. Interference Free Group Testing and Reactive Jamming Attacks (Overview, Problem Models and Preliminaries, Group Testing based Trigger Node Identification-Preprocessing, Identifying Trigger Nodes(ITN) Algorithm, Theoretical Analysis, Experimental Analysis). -4. Randomized Fault Tolerant Group Testing and Advanced Security (Advanced Attacker Model, Error-tolerant Randomized Non-Adaptive Group Testing, Clique-Independent Set, Advanced Trigger Node Identification, Advanced Solutions Toward Sophisticated Attack Models, Experimental Analysis). -5. Outlooks (General Detection Framework based on Group Testing, Size Constraint Group Testing, Jamming Attacks and Trigger Node Detection).-References. – Index.
-1. Group Testing (Introduction, Basic Theory and Design, Applications in Network Security). -2.Size Constraint Group Testing and DoS Attacks (Overview, Network System Models, Size Constraint Group Testing, Matrix Construction and Latency Analyses, Detection System Configuration, Experimental Analysis). -3. Interference Free Group Testing and Reactive Jamming Attacks (Overview, Problem Models and Preliminaries, Group Testing based Trigger Node Identification-Preprocessing, Identifying Trigger Nodes(ITN) Algorithm, Theoretical Analysis, Experimental Analysis). -4. Randomized Fault Tolerant Group Testing and Advanced Security (Advanced Attacker Model, Error-tolerant Randomized Non-Adaptive Group Testing, Clique-Independent Set, Advanced Trigger Node Identification, Advanced Solutions Toward Sophisticated Attack Models, Experimental Analysis). -5. Outlooks (General Detection Framework based on Group Testing, Size Constraint Group Testing, Jamming Attacks and Trigger Node Detection).-References. - Index.
-1. Group Testing (Introduction, Basic Theory and Design, Applications in Network Security). -2.Size Constraint Group Testing and DoS Attacks (Overview, Network System Models, Size Constraint Group Testing, Matrix Construction and Latency Analyses, Detection System Configuration, Experimental Analysis). -3. Interference Free Group Testing and Reactive Jamming Attacks (Overview, Problem Models and Preliminaries, Group Testing based Trigger Node Identification-Preprocessing, Identifying Trigger Nodes(ITN) Algorithm, Theoretical Analysis, Experimental Analysis). -4. Randomized Fault Tolerant Group Testing and Advanced Security (Advanced Attacker Model, Error-tolerant Randomized Non-Adaptive Group Testing, Clique-Independent Set, Advanced Trigger Node Identification, Advanced Solutions Toward Sophisticated Attack Models, Experimental Analysis). -5. Outlooks (General Detection Framework based on Group Testing, Size Constraint Group Testing, Jamming Attacks and Trigger Node Detection).-References. – Index.
-1. Group Testing (Introduction, Basic Theory and Design, Applications in Network Security). -2.Size Constraint Group Testing and DoS Attacks (Overview, Network System Models, Size Constraint Group Testing, Matrix Construction and Latency Analyses, Detection System Configuration, Experimental Analysis). -3. Interference Free Group Testing and Reactive Jamming Attacks (Overview, Problem Models and Preliminaries, Group Testing based Trigger Node Identification-Preprocessing, Identifying Trigger Nodes(ITN) Algorithm, Theoretical Analysis, Experimental Analysis). -4. Randomized Fault Tolerant Group Testing and Advanced Security (Advanced Attacker Model, Error-tolerant Randomized Non-Adaptive Group Testing, Clique-Independent Set, Advanced Trigger Node Identification, Advanced Solutions Toward Sophisticated Attack Models, Experimental Analysis). -5. Outlooks (General Detection Framework based on Group Testing, Size Constraint Group Testing, Jamming Attacks and Trigger Node Detection).-References. - Index.
Rezensionen
From the reviews: "The topic of this monograph is at the crossroads of optimization, network security, graph theory, and algorithmic complexity. ... The monograph is written in a compact and precise style. ... Given the network architecture of modern communications, the topic is certainly timely. In sum, this monograph provides advanced solutions based on group testing to some particular threats to network security. Therefore, it is going to be very useful for researchers seeking a brief introduction to the state-of-art of this new and specialized methodology." (José M. Amigó, Mathematical Reviews, January, 2013)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497