De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger i SpringerBriefs on Cyber Security Systems and Networks serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • - A Feature Learning Approach
    af Kwangjo Kim, Muhamad Erza Aminanto & Harry Chandra Tanuwidjaja
    666,95 kr.

    This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods.

  • af Yang Xiang, Chee Keong NG & Lei Pan
    571,95 kr.

  • - A Dual Perspective
    af Shankar Karuppayah
    668,95 kr.

    This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration.

  • - Volume 1: Data Reduction Framework and Selective Imaging
    af Kim-Kwang Raymond Choo & Darren Quick
    665,95 kr.

    This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data.

  • - Volume 2: Quick Analysis for Evidence and Intelligence
    af Darren Quick & Kim-Kwang Raymond Choo
    666,95 kr.

    This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data.

  • af Wanlei Zhou, Bo Liu, Yong Xiang, mfl.
    555,95 kr.

    It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications.

  • - Scope and Applications
    af Dietmar P.F. Moller
    584,95 kr.

    This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge).

  • - A Stream Cipher in Mobile Telephony
    af Chandra Sekhar Mukherjee
    584,95 kr.

    This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC.