Muutke küpsiste eelistusi

E-raamat: Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling

  • Formaat: 314 pages
  • Ilmumisaeg: 31-Jan-2008
  • Kirjastus: Artech House Publishers
  • ISBN-13: 9781596932906
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 87,75 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 314 pages
  • Ilmumisaeg: 31-Jan-2008
  • Kirjastus: Artech House Publishers
  • ISBN-13: 9781596932906
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Over the past decade, homeland security (HS) has taken on paramount importance in our society. At the technical level, homeland security involves sensor networks and the preprocessing of data, the handling of sensitive data with secure and safe procedures, and the design, modeling and simulation of complex HS systems. Written and edited by leading experts in the field, this timely resource presents a thorough overview of these technical facets of Homeland Security (HS). Professionals learn how to store, encrypt and mine sensitive data. Further, the book shows how data is transmitted and received along wired or wireless networks, operating on electromagnetic channels. This unique, cutting-edge resource covers the field's most critical topics, from embedded wireless sensor networks, tapping the vehicle grid for homeland security, and visual detection of humans...to single-database private information retrieval, sensing through walls, and stopping cars and mobiles.
Preface xv
The Homeland Security Scenario
1(14)
The Scenario
1(4)
Composing Expertise and Technologies
5(1)
System of System General Architecture
6(4)
The Applications
10(1)
System of System Engineering
10(2)
References
12(3)
Embedded Wireless Sensor Networks
15(32)
Introduction
15(1)
Sensor Network Design Drivers: Resource Constraints and Autonomy
16(1)
Resource Constraints
17(5)
In-Network Processing for Computing, Storage, and Communication Energy Trade-Offs
19(1)
Time Is Energy: Sleep Optimization Via Time Uncertainty Management
19(3)
Network Autonomy
22(7)
Self-Configuration: Localizing Nodes in Space and Time
23(4)
Energy Neutral Operation
27(2)
Lessons Learned
29(11)
Beyond Smart Dust to Heterogeneous Sensor Ecologies
29(1)
Incorporating the Human Tier
30(1)
To Sense or Not to Sense: Optimizing the Sampling Energy
31(3)
Mobility as a Performance Amplifier
34(2)
Monitoring the Monitors: Sensor Data Integrity
36(4)
Future Directions: Participatory Sensing
40(1)
Conclusions
41(1)
Acknowledgments
42(1)
References
42(5)
Visual Detection and Classification of Humans, Their Pose, and Their Motion
47(26)
Introduction
47(2)
Detection of Humans
49(10)
Faces
49(1)
Full-Body
50(9)
Tracking Human Motion
59(1)
Tracking as Transition Between Key Frames
59(1)
Continuous Temporal Models
59(1)
Classification and Recognition of Human Motion
60(7)
Integral Representations
60(1)
Global Measures of Similarity
61(1)
Classification of Models
61(4)
Gait Recognition
65(2)
Outlook
67(1)
References
68(5)
Cyber Security Basic Defenses and Attack Trends
73(30)
Introduction
73(2)
Basic Concepts
75(2)
Common Security Goals
75(1)
Threat Modeling
76(1)
Security Analysis
76(1)
Cryptography
77(5)
Hash Functions
77(1)
Secret-Key and Public-Key Cryptography
78(2)
Confidentiality
80(1)
Integrity
81(1)
Authentication
81(1)
Network Security
82(4)
Firewalls, IDSs, and Honeypots
84(2)
Software Security
86(4)
Software Vulnerabilities
86(2)
Malicious Software
88(1)
Defenses
88(2)
Cyber Attack Trends, Threats, and Homeland Security
90(7)
Cyber Crime and Botnets
91(1)
Widely Spread Malware
92(1)
DDoS Attacks, Estonia, and Hacktivism
93(2)
Cyber Espionage and the Athens Affair
95(1)
Critical Infrastructure and Cyber Security
96(1)
Conclusions
97(1)
Acknowledgments
98(1)
References
98(5)
Mining Databases and Data Streams
103(40)
Introduction and Historical Perspective
103(3)
Examples of DM Methods and Applications
104(2)
Data Mining Methods
106(16)
Taxonomy of Data Mining Methods
106(1)
Classification and Prediction
106(6)
Association Rules
112(4)
Clustering Methods
116(2)
Other Mining Techniques
118(1)
The KDD Process
119(3)
Web Mining and New Applications
122(7)
Web Mining
122(3)
Security Applications
125(3)
Privacy-Preserving Data Mining
128(1)
Mining Data Streams
129(10)
Intrusion Detection and Network Monitoring
129(1)
Data Mining Systems
130(3)
DSMSs and Online Mining
133(1)
Stream Mill: An Inductive DSMS
133(3)
Data Stream Mining Algorithms
136(3)
Conclusions
139(1)
References
139(4)
Private Information Retrieval: Single-Database Techniques and Applications
143(34)
Introduction
143(1)
Single-Database Private Information Retrieval
144(5)
Amortizing Database Work in PIR
145(1)
Connections: Single-Database PIR and OT
145(1)
Connections: PIR and Collision-Resistant Hashing
146(1)
Connections: PIR and Function-Hiding PKE
147(1)
Connections: PIR and Complexity Theory
147(1)
Public-Key Encryption That Supports PIR Read and Write
148(1)
Organization of the Rest of the
Chapter
148(1)
Background and Preliminaries
149(6)
Encryption Schemes
149(3)
Private Information Retrieval
152(1)
Balancing the Communication Between Sender and Receiver
153(2)
Semantically Secure Homomorphic Encryption Schemes: Examples
155(6)
Encryption Based on Quadratic Residues
155(2)
The ElGamal Cryptosystem
157(1)
The Paillier Cryptosystem
158(3)
PIR Based on Group-Homomorphic Encryption
161(6)
Basic Protocols From Homomorphic Encryption
163(1)
Optimizing Via an Integer Map
164(1)
Further Improvements: Length-Flexible Cryptosystems
165(2)
Private Information Retrieval Based on the Φ-Hiding Assumption
167(4)
Preliminaries
167(1)
A Brief Description of the Protocol
168(2)
Generalizations: Smooth Subgroups
170(1)
Private Information Retrieval from Any Trapdoor Permutation
171(2)
Preliminaries
171(1)
Outline of the Protocol
171(1)
Protocol Details
172(1)
Conclusions
173(4)
References
173(4)
Tapping Vehicle Sensors for Homeland Security
177(30)
Introduction
177(3)
State of the Art
180(3)
VANETs
180(1)
Opportunistic Sensor Networking
181(2)
MobEyes Architecture
183(1)
MObEyes Diffusion/Harvesting Processor
184(8)
MDHP Protocol Design Principles
185(1)
Summary Diffusion
186(2)
Summary Harvesting
188(4)
MobEyes Performance Evaluation
192(7)
Simulation Setup
192(2)
Stability Check
194(2)
Tracking Application
196(1)
Border Effects and Turnover
197(2)
MobEyes Privacy and Security
199(3)
Conclusions
202(1)
References
203(4)
Modeling and Analysis of Wireless Networked Systems
207(34)
Introduction
207(2)
Wireless Networked Systems for Critical Infrastructure
209(9)
Real-Time Measurement Systems
210(1)
Real-Time Control Systems
211(2)
Theory of Networked Control Systems
213(5)
Wireless Network Metrics
218(17)
Choice of Network Models
219(1)
Modeling Unicast Path Diversity
220(5)
Modeling Directed Staged Flooding
225(6)
Using the Network Metrics
231(4)
Limitations of the Models and Future Work
235(1)
Conclusions
235(1)
Acknowledgments
236(1)
References
236(3)
Appendix 8A Proof Sketch for Theorems 8.1 and 8.3
239(2)
Large Systems Modeling and Simulation
241(38)
Introduction
241(1)
The Challenge of Homeland Protection
242(3)
Definitions and Background
245(1)
The Role of Modeling and Simulation
246(2)
Reductionist Approaches to the Modeling of Large Systems
248(2)
Horizontal Decomposition
248(1)
Vertical Decomposition
249(1)
Simulation Architecture for Performance Evaluation
250(6)
End-to-End Level
251(1)
Medium Grain Accuracy Level
252(2)
Fine Grain Accuracy Level
254(2)
Study Cases
256(18)
End-to-End Simulation of a Maritime Border Control System
257(6)
Multisensor Fusion for Naval Threat
263(11)
Conclusions
274(1)
Acknowledgments
274(1)
References
275(4)
About the Authors 279(6)
Index 285
Giorgio Franceschetti is a full professor at the University Federico II, Napoli, Italy, an adjunct professor at UCLA, and a distinguished visiting scientist at JPL. Dr. Franceschetti is the author/editor of several books and has published over 160 scientific papers in peer-reviewed journals of recognized standards. Marina Grossi is chief executive officer of SELEX Sistemi Integrati, a Finmeccanica company, leader in defense electronics and air traffic control systems.