This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Dr. Muhammad Usman
Muhammad Usman received his Ph.D. degree from the School of Information and Communication Technology, Griffith University, Australia. He has obtained Juniper Networks, USA, certifications as an internet specialist and internet associate in enterprise routing and switching. He is a member of the Network Security Research Group and the Institute for Integrated and Intelligent Systems (IIIS), Griffith University, Australia. He is also a member of the Computer Science Teacher Association endorsed by the Association for Computing Machinery (ACM), USA. He is currently associated with the Department of Computer Sciences, Quaid-I-Azam University, Pakistan, as an Assistant Professor. His current research interests are Security and Privacy, Cloud Computing, Internet of Things, Distributed Systems, and Modeling and Analysis. He has published over twenty five research papers for international journals and conferences including prestigious journals such as IEEE Transactions on Consumer Electronics. He has been a recipient of several honors, awards, and grants throughout his industrial and academic career.
Vallipuram Muthukkumarasamy
Vallipuram Muthukkumarasamy obtained his B.Sc. in Engineering from the University of Peradeniya, Sri Lanka and his Ph.D. from Cambridge University, England. He is currently attached to the School of Information and Communication Technology, Griffith University, Australia as an Associate Professor. His current research areas include the investigation of security issues in wireless networks, sensor networks, trust management in mobile ad hoc networks (MANETs), key establishment protocols and medical sensors. He currently heads the Network Security Research Group at the Institute for Integrated and Intelligent Systems at Griffith University. Also providing leadership with regard to innovative learning and teaching practices, he has received a number of best teacher awards.
Dr. Xin-Wen Wu
Xin-Wen Wu received his Ph.D. degree from the Chinese Academy of Sciences, Beijing. He has worked in the University of California at San Diego (as a postdoctoral researcher), the Chinese Academy of Sciences, and the University of Melbourne (as a research fellow). He was also affiliated with the University of Ballarat, Australia. He joined Griffith University, Australia, in 2010, as a faculty member at the School of Information and Communication Technology. His research interests include cyber security and data privacy, applied cryptography, coding techniques, and information theory and its applications. He has published extensively in these areas, including three books and over eighty research papers in leading journals of IEEE, Springer, and Elsevier, in addition to proceedings of international conferences. He is a senior member of IEEE.
Ms. Surraya Khanum
Surraya Khanum received her M.S. (Computer Science) from International Islamic University, Islamabad, Pakistan. She has been associated with Griffith University, Australia as a visiting research associate. She has also worked as a Lecturer at King Khalid University, Saudi Arabia and as a Visiting Lecturer at Department of Computer Sciences, Quaid-I-Azam University, Pakistan. She has published numerous research papers, predominantly in the domains of mobile agent-based distributed systems and intrusion detection systems.
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 10,00 per la spedizione da Germania a Italia
Destinazione, tempi e costiEUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Germania
xxi, 137 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Sprache: Englisch. Codice articolo 1144LB
Quantità: 1 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Dr. Muhammad UsmanMuhammad Usman received his Ph.D. degree from the School of Information and Communication Technology, Griffith University, Australia. He has obtained Juniper Networks, USA, certifications as an internet specialist and inte. Codice articolo 178437168
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Buch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike. 164 pp. Englisch. Codice articolo 9789811074660
Quantità: 2 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Buch. Condizione: Neu. Neuware -This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 164 pp. Englisch. Codice articolo 9789811074660
Quantità: 2 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9789811074660_new
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 30456570-n
Quantità: Più di 20 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Buch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike. Codice articolo 9789811074660
Quantità: 1 disponibili
Da: California Books, Miami, FL, U.S.A.
Condizione: New. Codice articolo I-9789811074660
Quantità: Più di 20 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 30456570-n
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 30456570
Quantità: Più di 20 disponibili