語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Accountability and Privacy in Networ...
~
Ge, Jingguo.
Accountability and Privacy in Network Security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Accountability and Privacy in Network Security/ by Yuxiang Ma, Yulei Wu, Jingguo Ge.
作者:
Ma, Yuxiang.
其他作者:
Wu, Yulei.
面頁冊數:
XII, 140 p. 62 illus., 59 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer communication systems. -
電子資源:
https://doi.org/10.1007/978-981-15-6575-5
ISBN:
9789811565755
Accountability and Privacy in Network Security
Ma, Yuxiang.
Accountability and Privacy in Network Security
[electronic resource] /by Yuxiang Ma, Yulei Wu, Jingguo Ge. - 1st ed. 2020. - XII, 140 p. 62 illus., 59 illus. in color.online resource.
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
ISBN: 9789811565755
Standard No.: 10.1007/978-981-15-6575-5doiSubjects--Topical Terms:
1115394
Computer communication systems.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Accountability and Privacy in Network Security
LDR
:02720nam a22003855i 4500
001
1029226
003
DE-He213
005
20200915122224.0
007
cr nn 008mamaa
008
210318s2020 si | s |||| 0|eng d
020
$a
9789811565755
$9
978-981-15-6575-5
024
7
$a
10.1007/978-981-15-6575-5
$2
doi
035
$a
978-981-15-6575-5
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
100
1
$a
Ma, Yuxiang.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1325864
245
1 0
$a
Accountability and Privacy in Network Security
$h
[electronic resource] /
$c
by Yuxiang Ma, Yulei Wu, Jingguo Ge.
250
$a
1st ed. 2020.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
XII, 140 p. 62 illus., 59 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
520
$a
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer system failures.
$3
782237
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
System Performance and Evaluation.
$3
669346
700
1
$a
Wu, Yulei.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1241785
700
1
$a
Ge, Jingguo.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1325865
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811565748
776
0 8
$i
Printed edition:
$z
9789811565762
856
4 0
$u
https://doi.org/10.1007/978-981-15-6575-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入