Tags
Language
Tags

Mobile Authentication: Problems and Solutions

Posted By: AvaxGenius
Mobile Authentication: Problems and Solutions

Mobile Authentication: Problems and Solutions by Markus Jakobsson
English | PDF | 2013 | 121 Pages | ISBN : 1461448778 | 5.3 MB

Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes.

Distributed Denial of Service Attack and Defense

Posted By: AvaxGenius
Distributed Denial of Service Attack and Defense

Distributed Denial of Service Attack and Defense by Shui Yu
English | PDF | 2014 | 104 Pages | ISBN : 1461494907 | 1.6 MB

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

Resource Management in Utility and Cloud Computing

Posted By: AvaxGenius
Resource Management in Utility and Cloud Computing

Resource Management in Utility and Cloud Computing by Han Zhao
English | PDF | 2013 | 94 Pages | ISBN : 1461489695 | 3.6 MB

This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different scheduling contexts. The first scheme, taking the Amazon EC2™ market as a case of study, investigates the optimal resource rental planning models based on linear integer programming and stochastic optimization techniques.

Location Privacy Protection in Mobile Networks

Posted By: AvaxGenius
Location Privacy Protection in Mobile Networks

Location Privacy Protection in Mobile Networks by Xinxin Liu
English | PDF | 2013 | 83 Pages | ISBN : 1461490731 | 2.2 MB

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted.

Automatic Modulation Recognition of Communication Signals

Posted By: AvaxGenius
Automatic Modulation Recognition of Communication Signals

Automatic Modulation Recognition of Communication Signals by Elsayed Elsayed Azzouz
English | PDF | 1996 | 233 Pages | ISBN : 0792397967 | 14.6 MB

Automatic modulation recognition is a rapidly evolving area of signal analysis. In recent years, interest from the academic and military research institutes has focused around the research and development of modulation recognition algorithms.

Traffic Measurement for Big Network Data (Repost)

Posted By: AvaxGenius
Traffic Measurement for Big Network Data (Repost)

Traffic Measurement for Big Network Data By Shigang Chen, Min Chen, Qingjun Xiao
English | PDF | 2017 | 104 Pages | ISBN : 3319473395 | 7.5 MB

This book presents several compact and fast methods for online traffic measurement of big network data. It describes challenges of online traffic measurement, discusses the state of the field, and provides an overview of the potential solutions to major problems.

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting

Posted By: AvaxGenius
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting by Peter H. Cole
English | PDF(True) | 2008 | 350 Pages | ISBN : 3540716408 | 7.7 MB

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the extent of their success, the various barriers that may be brought against their actions, and the effectiveness of those barriers. The new field of lightweight cryptography is described in the context of using RFID systems in the fight against counterfeit products, its cost effectiveness is examined and feasible approaches to its deployment are described. Research problems and likely avenues for solutions are also presented to guide a global effort in anti-counterfeiting.

Introduction to Intelligent Surveillance

Posted By: AvaxGenius
Introduction to Intelligent Surveillance

Introduction to Intelligent Surveillance by Wei Qi Yan
English | PDF(True) | 2016 | 151 Pages | ISBN : 3319285149 | 4.4 MB

This concise textbook/reference examines the fundamental aspects of intelligent computing for surveillance systems, from camera calibration and data capturing, to secure data transmission. The text covers digital surveillance from the level of an individual object or biometric feature, to the full lifecycle of an event. This is followed by a detailed discussion on how an intelligent system can independently monitor and learn from an event, and invite human input when necessary. The book concludes with a presentation on how the computation speed of the system can be enhanced through the use of supercomputing technology.