OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Bookmark Share

Text

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications

LU, Zhou - Personal Name; WANG, Wenye - Personal Name; WANG, Cliff - Personal Name;

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.


Availability

No copy data

Detail Information
Series Title
SpringerBriefs in Computer Science
Call Number
-
Publisher
: ., 2015
Collation
XIII, 116
Language
English
ISBN/ISSN
978-3-319-23287-4
Classification
NONE
Content Type
text
Media Type
computer
Carrier Type
online resource
Edition
1
Subject(s)
Computer Communication Networks
Computer and Information Systems Applications
Data and Information Security
Specific Detail Info
-
Statement of Responsibility
Zhou Lu
Other Information
Cataloger
Devi
Source
-
Other version/related

No other version available

File Attachment
  • Modeling and Evaluating Denial
Comments

You must be logged in to post a comment

OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?