1 - 3
1. Principles of ad hoc networking [2007]
- Barbeau, Michel (Computer scientist)
- Chichester, England ; Hoboken, NJ : John Wiley & Sons Ltd., c2007.
- Description
- Book — xx, 254 p. : ill. ; 25 cm.
- Summary
-
- Preface.Glossary
- .1. Wireless Data Communications.1.1 Signal Representation.1.2 Analog to Digital Conversion.1.3 Digital to Analog Conversion.1.4 Architecture of an SDR Application.1.5 Quadrature Modulation and Demodulation.1.6 Spread Spectrum.1.7 Antenna.1.8 Propagation.1.9 Ultrawideband.1.10 Energy Management.1.11 Exercise
- .2. Medium Access Control.2.1 Fundamentals of Probability and Statistics.2.2 Modeling Traffic.2.3 Multiple Access.2.4 Demand Assigned Multiple Access.2.5 Carrier Sense Multiple Access in IEEE 802.11.2.6 Medium Access Control in ad hov Networks.2.7 Bibliographic Comments.2.8 Exercises
- .3. Ad Hov Wireless Access.3.1 Management of Bluetooth Networks.3.2 Model for Node Discovery in Bluetooth.3.3 Bluetooth Formation Algorithms.3.4 Mesh Mode of WiMAX/802.16.3.5 Bibliographic Comments.Exercises
- .4. Wireless Network Programming.4.1 Structure of Information.4.2 Socket.4.3 Parameters and Control.4.4 Receiving Frames.4.5 Sending Frames.4.6 Exercises
- .5. Ad Hov Networks Protocols.5.1 Normal IP Routing.5.2 The Reactive Approach.5.3 The Proactive Approach.5.4 The Hybrid Approach.5.5 Clustering.5.6 Quality of Service.5.7 Sensor Network Protocols.5.8 Exercises
- .6. Location Awareness.6.1 Geographic Proximity.6.2 Constructing Spanners of ad hov Networks.6.3 Information Dissemination.6.4 Geographic Location Determination.6.5 Random Unit Disc Graphs.6.6 Coverage and Connectivity with Directional Sensors.6.7 Bibliographic Comments.6.8 Exercises
- .7. Ad Hov Networks Security.7.1 Authentication Techniques.7.2 Physical Layer Attacks.7.3 Security of Application Protocols.7.4 Biometrics-based Key Establishment.7.5 Routing Security.7.6 Broadcast Security.7.7 Secure Location Verification.7.8 Security in Directional Antenna Systems.7.9 Bibliographic Comments.7.10 Exercises.Bibliography.Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5103.2 .B367 2007 | Available |
- FPS (symposium) (12th : 2019 : Toulouse, France)
- Cham : Springer, 2020.
- Description
- Book — 1 online resource (415 pages)
- Summary
-
- Machine Learning Approaches.- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks.- Ransomware Network Traffic Analysis for Pre-Encryption Alert.- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles.- Selection and performance analysis of CICIDS2017 features importance.- Semantic Representation Based on Deep Learning for Spam Detection.- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis.- Labelled Network Capture Generation For Anomaly Detection.- Attack Prevention and Trustworthiness.- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS.- Secure Logging with Security against Adaptive Crash Attack.- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience.- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE.- Protecting Android Apps from Repackaging Using Native Code.- Access Control Models and Cryptography.- Command Dependencies in Heuristic Safety Analysis of Access Control Models.- On Attribute Retrieval in ABAC.- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control.- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme.- An Efficient Identification Scheme Based on Rank Metric.- Security Analysis of Auctionity: a blockchain based e-auction.- Dynamic Searchable Encryption with Access Control.- Short Papers.- Get-your-ID: Decentralized Proof of Identity.- Towards secure TMIS protocols.- Detecting Ransomware in Encrypted Web Traffic.- Digital forensics in vessel transportation systems.- A Privacy Protection Layer for Wearable Devices.- Validating the DFA Attack Resistance of AES.- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications.- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History.- Towards Privacy-Aware Smart Surveillance.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Waltham, MA : Morgan Kaufmann, ©2012.
- Description
- Book — 1 online resource (xxx, 816 pages) : illustrations
- Summary
-
- Securing cyber-physical infrastructure : perspectives and overview of the handbook
- Security and vulnerability of cyber-physical infrastructure networks : a control-theoretic approach / Mengran Xue [and others]
- Game theory for infrastructure security : the power of intent-based adversary models / Xin Jin [and others]
- An analytical framework for cyber-physical networks / Nageswara S.V. Rao [and others]
- Evolution of widely spreading worms and countermeasures : epidemic theory and application / Wei Yu [and others]
- Mobile wireless network security / Michel Barbeau
- Robust wireless infrastructure against jamming attacks / Guevara Noubir
- Security for mobile ad hoc networks / Raja Datta, Ningrinla Marchang
- Defending against identity-based attacks in wireless networks / Yingying Chen, Jie Yang
- Efficient and distributed access control for sensor networks / Donggang Liu
- Defending against physical attacks in wireless sensor networks / Jin Teng, Wenjun Gu, Dong Xuan
- Node compromise detection in wireless sensor networks / Jun-Won Ho, Sajal K. Das
- Hardware and security : vulnerabilities and solutions / Gedare Bloom [and others]
- Languages and security : safer software through language and compiler techniques / Rahul Simha, Scotty Smith
- Protecting ata in outsourcing scenarios / Sabrina De Capitani di Vimercate, Sara Foresti, Pierangela Samarati
- Data security in cloud computing / Shucheng Yu, Wenjing Lou, Kui Ren
- Secure mobile cloud computing / Mayank Raj, Mario Di Francesco, Sajal K. Das
- Relation privacy preservation in publishing online social networks / Na Li, Nan Zhang, Sajal K. Das
- Distributed network and system monitoring for securing cyber-physical infrastructure / Yang Liu, Yong Guan
- Discovering and tracking patterns of interest in security sensor streams / Parisa Rashidi, Narayanan Krishnan, Diane J. Cook
- Pervasive sensing and monitoring for situational awareness / Sharad Mehrotra [and others]
- Sense and response systems for crisis management / J.J. Bunn [and others]
- Managing and securing critical infrastructure -- a semantic policy- and trust-driven approach / Wenjia Li [and others]
- Policies, access control, and formal methods / Elisa Bertino
- Formal analysis of policy-based security configurations in enterprise networks / S.K. Ghosh, Ehab Al-Shaer, P. Bera
- Security and privacy in the smart grid / Alvaro A. Cárdenas, Reihaneh Safavi-Naini
- Cyber-physical security of automotive information technology / Richard R. Brooks, Seok Bae Yun, Juan Deng
- Security and privacy for mobile health-care (m-Health) systems / Jinyuan Sun [and others]
- Security and robustness in the internet infrastructure / Krishna Kant, Casey Deccio
- Emergency vehicular networks / Mario Gerla [and others]
- Security issues in VoIP telecommunication networks / Xiaohui Yang, Ram Dantu, Duminda Wijesekera.
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.