語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Accountability and privacy in networ...
~
Ma, Yuxiang.
FindBook
Google Book
Amazon
博客來
Accountability and privacy in network security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Accountability and privacy in network security/ by Yuxiang Ma, Yulei Wu, Jingguo Ge.
作者:
Ma, Yuxiang.
其他作者:
Wu, Yulei.
出版者:
Singapore :Springer Singapore : : 2020.,
面頁冊數:
xii, 140 p. :ill., digital ;24 cm.
內容註:
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-981-15-6575-5
ISBN:
9789811565755
Accountability and privacy in network security
Ma, Yuxiang.
Accountability and privacy in network security
[electronic resource] /by Yuxiang Ma, Yulei Wu, Jingguo Ge. - Singapore :Springer Singapore :2020. - xii, 140 p. :ill., digital ;24 cm.
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
ISBN: 9789811565755
Standard No.: 10.1007/978-981-15-6575-5doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .M39 2020
Dewey Class. No.: 004.6
Accountability and privacy in network security
LDR
:02411nmm a2200325 a 4500
001
2243527
003
DE-He213
005
20200915122224.0
006
m d
007
cr nn 008maaau
008
211207s2020 si s 0 eng d
020
$a
9789811565755
$q
(electronic bk.)
020
$a
9789811565748
$q
(paper)
024
7
$a
10.1007/978-981-15-6575-5
$2
doi
035
$a
978-981-15-6575-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.M39 2020
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
090
$a
TK5105.59
$b
.M111 2020
100
1
$a
Ma, Yuxiang.
$3
3503624
245
1 0
$a
Accountability and privacy in network security
$h
[electronic resource] /
$c
by Yuxiang Ma, Yulei Wu, Jingguo Ge.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
xii, 140 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
520
$a
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer networks.
$3
539554
650
0
$a
Computer security.
$3
540555
650
0
$a
Computer system failures.
$3
1530720
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
System Performance and Evaluation.
$3
891353
700
1
$a
Wu, Yulei.
$3
3503625
700
1
$a
Ge, Jingguo.
$3
3503626
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-981-15-6575-5
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9404573
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .M39 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入