Malicious Attack Propagation and Source Identification

Автор: literator от 26-09-2019, 19:27, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Malicious Attack Propagation and Source Identification
Автор: Jiaojiao Jiang, Sheng Wen
Издательство: Springer
Год: 2019
Страниц: 192
Язык: английский
Формат: pdf (true)
Размер: 13.5 MB

In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches.
 

Role of Blockchain Technology in IoT Applications

Автор: literator от 26-09-2019, 12:27, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Role of Blockchain Technology in IoT Applications
Автор: Shiho Kim, Ganesh Chandra Deka
Издательство: Academic Press
Серия: Advances in Computers, Volume 115
Год: 2019
Страниц: 348
Язык: английский
Формат: pdf
Размер: 26.0 MB

Role of Blockchain Technology in IoT Applications, Volume 115 in the Advances in Computers series, reviews the latest information on this topic that promises many applications in human life. According to forecasts made by various market research/survey agencies, there will be around 50 Billion connected devices (IoT) by 2020. Updates in this new release include chapters on the Technical Aspects of Blockchain and IoT, Integrated Platforms for Blockchain-Enablement, Intersections Between IoT and Distributed Ledger, Blockchain and Artificial Intelligence: How and Why Combining These Two Groundbreaking Technologies, Blockchain Applications in Health Care and Opportunities and Advancements Due to New Information Technology Frameworks, and more.
 

Элементарное введение в эллиптическую криптографию. Протоколы криптографии на эллиптических кривых

Автор: Biber от 26-09-2019, 11:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Элементарное введение в эллиптическую криптографию. Протоколы криптографии на эллиптических кривых
Автор: А.А. Болотов, С.Б. Гашков
Жанр: Учебное пособие
Издательство: КомКнига
Год: 2006
Страниц: 280
Язык: Русский
Формат: djvu
Размер: 12,38 Mb

Настоящая книга содержит описание и сравнительный анализ алгоритмов на эллиптических кривых. Изучаются протоколы эллиптической криптографии, имеющие аналоги — протоколы на основе алгебраических свойств мультипликативной группы конечного поля и протоколы, для которых таких аналогов нет — протоколы, основанные на спаривании Вейля и Тейта.
 

Mathematical Principles of the Internet, Volume 2: Mathematics

Автор: buratino от 26-09-2019, 09:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Mathematical Principles of the Internet, Volume 2: Mathematics (Chapman & Hall/CRC Computer and Information Science Series)
Автор: Nirdosh Bhatnagar
Издательство: Chapman and Hall/CRC
Год: 2018
Формат: True PDF
Страниц: 728
Размер: 10.5 Mb
Язык: English


This two-volume set on Mathematical Principles of the Internet provides a comprehensive overview of the mathematical principles of Internet engineering. The books do not aim to provide all of the mathematical foundations upon which the Internet is based. Instead, they cover a partial panorama and the key principles.
Volume 1 explores Internet engineering, while the supporting mathematics is covered in Volume 2. The chapters on mathematics complement those on the engineering episodes, and an effort has been made to make this work succinct, yet self-contained. Elements of information theory, algebraic coding theory, cryptography, Internet traffic, dynamics and control of Internet congestion, and queueing theory are discussed. In addition, stochastic networks, graph-theoretic algorithms, application of game theory to the Internet, Internet economics, data mining and knowledge discovery, and quantum computation, communication, and cryptography are also discussed.
 

Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science

Автор: buratino от 25-09-2019, 22:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science
Автор: Wayne Patterson, Cynthia E. Winston-Proctor
Издательство: CRC Press
Год: 2019
Формат: true pdf/rtf
Страниц: 290
Размер: 12.8 Mb
Язык: English

Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation.
Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds.
 

Cybersecurity and Privacy in Cyber Physical Systems

Автор: buratino от 25-09-2019, 21:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cybersecurity and Privacy in Cyber Physical Systems
Автор: Yassine Maleh (Editor), Shojafar Mohammad (Editor), Darwish Ashraf (Editor), Haqiq Abdelkrim (Editor)
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 454
Размер: 20.5 Mb
Язык: English

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It
Presents high-quality contributions addressing related theoretical and practical aspects
Improves the reader’s awareness of cybersecurity and privacy in CPSs
Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies...
 

Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы

Автор: Biber от 25-09-2019, 13:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы
Автор: А.А. Болотов, С.Б. Гашков
Жанр: Криптография
Издательство: КомКнига
Год: 2006
Страниц: 328
Язык: Русский
Формат: djvu
Размер: 14,61 Mb

Настоящая книга посвящена перспективному направлению в области защиты информации, математическую основу которого составляет теория эллиптических кривых.
 

Optical Wireless Communications: System and Channel Modelling with MATLAB®, Second Edition

Автор: buratino от 25-09-2019, 12:24, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Optical Wireless Communications: System and Channel Modelling with MATLAB®, 2nd Edition
Автор: Z. Ghassemlooy, W. Popoola, S. Rajbhandari
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 540
Размер: 35.7 Mb
Язык: English

The 2nd Edition of Optical Wireless Communications: System and Channel Modelling with MATLAB® with additional new materials, is a self-contained volume that provides a concise and comprehensive coverage of the theory and technology of optical wireless communication systems (OWC). The delivery method makes the book appropriate for students studying at undergraduate and graduate levels as well as researchers and professional engineers working in the field of OWC.
 

Emerging Security Algorithms and Techniques

Автор: buratino от 25-09-2019, 11:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Emerging Security Algorithms and Techniques
Автор: Khaleel Ahmad (Editor), M. N. Doja (Editor), Nur Izura Udzir (Editor), Manu Pratap Singh (Editor)
Издательство: Chapman and Hall/CRC
Год: 2019
Формат: True PDF
Страниц: 330
Размер: 10.5 Mb
Язык: English

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.
Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.
 

Protecting Information Assets and IT Infrastructure in the Cloud

Автор: buratino от 25-09-2019, 10:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Protecting Information Assets and IT Infrastructure in the Cloud
Автор: Ravi Das, de Guise, Preston
Издательство: Auerbach Publications
Год: 2019
Формат: True PDF
Страниц: 318
Размер: 4.8 Mb
Язык: English

Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.