Bøger af Shui Yu
-
1.303,95 kr. In this book, the authors highlight the latest research findings on the security and privacy of federated learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference, poisoning, generative adversarial networks, differential privacy, secure multi-party computation, homomorphic encryption, and shuffle, respectively. The book offers an essential overview for researchers who are new to the field, while also equipping them to explore this ¿uncharted territory.¿ For each topic, the authors first present the key concepts, followed by the most important issues and solutions, with appropriate references for further reading. The book is self-contained, and all chapters can be read independently. It offers a valuable resource for master¿s students, upper undergraduates, Ph.D. students, and practicing engineers alike.
- Bog
- 1.303,95 kr.
-
641,95 kr. This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2022, which was held in Melbourne, Australia, in November 23-25,2022. The 11 full papers were selected from 30 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on network security; network communication; network services; mobile and ad hoc networks; blockchain; machine learning.
- Bog
- 641,95 kr.
-
542,95 kr. This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.
- Bog
- 542,95 kr.
-
1.357,95 kr. This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;
- Bog
- 1.357,95 kr.
-
621,95 kr. This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology.
- Bog
- 621,95 kr.