Distributed denial of service attacks : concepts, mathematical and cryptographic solutions /

This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Ram, Mangey (HerausgeberIn), Singh, Rajeev (MitwirkendeR, HerausgeberIn)
Format: E-Book
Sprache:Englisch
Veröffentlicht: Berlin ; Boston : De Gruyter, [2021]
Schriftenreihe:De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ; 6
Schlagworte:
ISBN:9783110619751
Online-Zugang: Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000005i 4500
003 SK-BrCVT
005 20220617194241.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 210830t20212021gw fo d z eng d
020 |a 9783110619751 
024 7 |a 10.1515/9783110619751  |2 doi 
035 |a CVTIDW18662 
040 |a DeGruyter  |b eng  |c CVT  |e AACR2 
041 0 |a eng 
044 |a gw  |c DE 
072 7 |a 510  |2 CVT 
080 |a 510.644.4  |2 2011 
080 |a 004.056  |2 2011 
245 0 0 |a Distributed denial of service attacks :  |b concepts, mathematical and cryptographic solutions /  |c ed. by Rajeev Singh, Mangey Ram. 
260 |a Berlin ;  |a Boston :   |b De Gruyter,   |c [2021] 
300 |a 1 online resource (XIV, 218 p.) 
490 0 |a De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ;  |v 6 
505 0 0 |t Frontmatter --   |t Preface --   |t Acknowledgments --   |t About the Editors --   |t Contents --   |t List of contributors --   |t Impact evaluation of DDoS and Malware attack using IoT devices --   |t Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection --   |t Cryptographic method based on Catalan objects and enumerative chess problem --   |t Distributed denial-of-service attacks and mitigation in wireless sensor networks --   |t New techniques for DDoS attacks mitigation in resource-constrained networks --   |t Detection and behavioral analysis of botnets using honeynets and classification techniques --   |t Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks --   |t Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain --   |t Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks --   |t Utilization of puzzles for protection against DDoS attacks --   |t Index 
516 |a text file PDF 
520 |a This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mathematical solutions that include aspects of encryption, decryption, hashing techniques, digital signatures, authentication, probability, statistical improvements to machine learning and soft computing as well as latest trends like blockchains to mitigate DDoS attacks. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
650 4 |a Fuzzy Logik. 
650 4 |a IT-Sicherheit. 
650 4 |a Informatik. 
650 4 |a Neuronaleas Netz. 
650 7 |a Technology & Engineering / Automation. 
653 |a Fuzzy logika 
653 |a IT bezpečnosť 
653 |a informatika 
653 |a neurónová sieť 
655 4 |a elektronické dokumenty 
700 1 |a Ram, Mangey,   |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Singh, Rajeev,   |e contributor.  |4 ctb  |4 https://id.loc.gov/vocabulary/relators/ctb 
700 1 |a Singh, Rajeev,   |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
856 4 0 |u http://hanproxy.cvtisr.sk/han/cvti-book-degruyter-eisbn-978-3-11-061975-1  |y Vzdialený prístup pre registrovaných používateľov 
910 |b ZE13217 
959 |a 08 
974 |f Elektronické zdroje 
992 |a SUD 
999 |c 101117  |d 101117