語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Accountability and privacy in networ...
~
Ge, Jingguo.
Accountability and privacy in network security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Accountability and privacy in network securityby Yuxiang Ma, Yulei Wu, Jingguo Ge.
作者:
Ma, Yuxiang.
其他作者:
Wu, Yulei.
出版者:
Singapore :Springer Singapore :2020.
面頁冊數:
xii, 140 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer networksSecurity measures.
電子資源:
https://doi.org/10.1007/978-981-15-6575-5
ISBN:
9789811565755$q(electronic bk.)
Accountability and privacy in network security
Ma, Yuxiang.
Accountability and privacy in network security
[electronic resource] /by Yuxiang Ma, Yulei Wu, Jingguo Ge. - Singapore :Springer Singapore :2020. - xii, 140 p. :ill., digital ;24 cm.
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
ISBN: 9789811565755$q(electronic bk.)
Standard No.: 10.1007/978-981-15-6575-5doiSubjects--Topical Terms:
185597
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .M39 2020
Dewey Class. No.: 004.6
Accountability and privacy in network security
LDR
:02411nmm a2200325 a 4500
001
585895
003
DE-He213
005
20200915122224.0
006
m d
007
cr nn 008maaau
008
210323s2020 si s 0 eng d
020
$a
9789811565755$q(electronic bk.)
020
$a
9789811565748$q(paper)
024
7
$a
10.1007/978-981-15-6575-5
$2
doi
035
$a
978-981-15-6575-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.M39 2020
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
090
$a
TK5105.59
$b
.M111 2020
100
1
$a
Ma, Yuxiang.
$3
877155
245
1 0
$a
Accountability and privacy in network security
$h
[electronic resource] /
$c
by Yuxiang Ma, Yulei Wu, Jingguo Ge.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
xii, 140 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
520
$a
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computer networks.
$3
181923
650
0
$a
Computer security.
$3
184416
650
0
$a
Computer system failures.
$3
509219
650
1 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
System Performance and Evaluation.
$3
273898
700
1
$a
Wu, Yulei.
$3
877156
700
1
$a
Ge, Jingguo.
$3
877157
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-981-15-6575-5
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000189712
電子館藏
1圖書
電子書
EB TK5105.59 .M111 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-15-6575-5
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入