CSWS'14

CSWS'14

Author: Association for Computing Machinery

Publisher:

Published: 2014

Total Pages: 64

ISBN-13:

DOWNLOAD EBOOK


Next-Generation Internet

Next-Generation Internet

Author: Byrav Ramamurthy

Publisher: Cambridge University Press

Published: 2011-02-03

Total Pages: 434

ISBN-13: 9780521113687

DOWNLOAD EBOOK

With ever-increasing demands on capacity, quality of service, speed, and reliability, current Internet systems are under strain and under review. Combining contributions from experts in the field, this book captures the most recent and innovative designs, architectures, protocols, and mechanisms that will enable researchers to successfully build the next-generation Internet. A broad perspective is provided, with topics including innovations at the physical/transmission layer in wired and wireless media, as well as the support for new switching and routing paradigms at the device and sub-system layer. The proposed alternatives to TCP and UDP at the data transport layer for emerging environments are also covered, as are the novel models and theoretical foundations proposed for understanding network complexity. Finally, new approaches for pricing and network economics are discussed, making this ideal for students, researchers, and practitioners who need to know about designing, constructing, and operating the next-generation Internet.


HotSDN'14

HotSDN'14

Author: Association for Computing Machinery

Publisher:

Published: 2014

Total Pages: 242

ISBN-13:

DOWNLOAD EBOOK


SRIF'14

SRIF'14

Author: Association for Computing Machinery

Publisher:

Published: 2014

Total Pages: 94

ISBN-13:

DOWNLOAD EBOOK


Information Fusion for Cyber-Security Analytics

Information Fusion for Cyber-Security Analytics

Author: Izzat M Alsmadi

Publisher: Springer

Published: 2016-10-21

Total Pages: 379

ISBN-13: 3319442570

DOWNLOAD EBOOK

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.