Muutke küpsiste eelistusi

Security in Next Generation Mobile and Wireless Networks Edition. ed. [Kõva köide]

Edited by , Edited by
  • Formaat: Hardback, 390 pages, kõrgus x laius: 235x155 mm
  • Ilmumisaeg: 29-Nov-2020
  • Kirjastus: Springer-Verlag New York Inc.
  • ISBN-10: 1441961623
  • ISBN-13: 9781441961624
  • Kõva köide
  • Hind: 121,90 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 143,41 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
Security in Next Generation Mobile and Wireless Networks Edition. ed.
  • Formaat: Hardback, 390 pages, kõrgus x laius: 235x155 mm
  • Ilmumisaeg: 29-Nov-2020
  • Kirjastus: Springer-Verlag New York Inc.
  • ISBN-10: 1441961623
  • ISBN-13: 9781441961624
The editors provide a comprehensive overview and guide of collborative attacks on wireless networks, along with discussion of detection systems and various defense mechanisms.The material is both theoretical and experimental. General strategies and solutions for correlating various forms of attacks are provided. Three main themes are carried throughout the book. These include identifiying and characterizing coordinated collaborative attacks, modeling of malicious attacks, and defending the network from such attacks.

This comprehensive guide to collaborative attacks on wireless networks includes detection systems and defense mechanisms. The book offers strategy for identifying and characterizing attacks, modeling malicious attacks, and defending the network from attack.
Comprehensive understanding of collaborative attacks
(CAs).-Collaborative security architectures.-Practical countermeasures to
collaborative attacks.-Analysis of collaborative attacks.-Defense mechanisms
against collaborative attacks.-Characterization and Modeling of
CAs.-Intrusion Detection Systems (IDS) capable of correlating
CAs.-Coordinated prevention/defense mechanisms.- Models for detecting attacks
in collaboration.- Characterization of CA patterns.- Simulations and
test-beds on CAs