Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Accountability and privacy in networ...
~
Ge, Jingguo.
Accountability and privacy in network security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Accountability and privacy in network securityby Yuxiang Ma, Yulei Wu, Jingguo Ge.
Author:
Ma, Yuxiang.
other author:
Wu, Yulei.
Published:
Singapore :Springer Singapore :2020.
Description:
xii, 140 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Computer networksSecurity measures.
Online resource:
https://doi.org/10.1007/978-981-15-6575-5
ISBN:
9789811565755$q(electronic bk.)
Accountability and privacy in network security
Ma, Yuxiang.
Accountability and privacy in network security
[electronic resource] /by Yuxiang Ma, Yulei Wu, Jingguo Ge. - Singapore :Springer Singapore :2020. - xii, 140 p. :ill., digital ;24 cm.
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
ISBN: 9789811565755$q(electronic bk.)
Standard No.: 10.1007/978-981-15-6575-5doiSubjects--Topical Terms:
185597
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .M39 2020
Dewey Class. No.: 004.6
Accountability and privacy in network security
LDR
:02411nmm a2200325 a 4500
001
585895
003
DE-He213
005
20200915122224.0
006
m d
007
cr nn 008maaau
008
210323s2020 si s 0 eng d
020
$a
9789811565755$q(electronic bk.)
020
$a
9789811565748$q(paper)
024
7
$a
10.1007/978-981-15-6575-5
$2
doi
035
$a
978-981-15-6575-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.M39 2020
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
090
$a
TK5105.59
$b
.M111 2020
100
1
$a
Ma, Yuxiang.
$3
877155
245
1 0
$a
Accountability and privacy in network security
$h
[electronic resource] /
$c
by Yuxiang Ma, Yulei Wu, Jingguo Ge.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
xii, 140 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
520
$a
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computer networks.
$3
181923
650
0
$a
Computer security.
$3
184416
650
0
$a
Computer system failures.
$3
509219
650
1 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
System Performance and Evaluation.
$3
273898
700
1
$a
Wu, Yulei.
$3
877156
700
1
$a
Ge, Jingguo.
$3
877157
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-981-15-6575-5
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000189712
電子館藏
1圖書
電子書
EB TK5105.59 .M111 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-981-15-6575-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login