Da: moluna, Greven, Germania
EUR 48,37
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 56,84
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 50,97
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 56,83
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 59,99
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Books Puddle, New York, NY, U.S.A.
EUR 72,30
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New. pp. 98.
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,12
Convertire valutaQuantità: 10 disponibili
Aggiungi al carrelloPF. Condizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 64,84
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Editore: Springer-Verlag New York Inc, 2013
ISBN 10: 1461489954 ISBN 13: 9781461489955
Lingua: Inglese
Da: Revaluation Books, Exeter, Regno Unito
EUR 75,99
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 86 pages. 6.00x8.75x0.25 inches. In Stock.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 52,68
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer-Verlag New York Inc., New York, NY, 2013
ISBN 10: 1461489954 ISBN 13: 9781461489955
Lingua: Inglese
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
EUR 64,11
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques. IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11a based wirelessA networks, IP-based multimedia communications over wireless networks are also drawingA extensive attention in both academia and industry. Due to the opennessA and distributed nature of the protocols involved, such as the session initiation protocolA (SIP) and the IEEE 802:11a standard, it becomes easy for malicious users inA the network to achieve their own gain or disrupt the service by deviating from theA normal protocol behaviors.A This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11a or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processin Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Editore: Springer-Verlag New York Inc., New York, NY, 2013
ISBN 10: 1461489954 ISBN 13: 9781461489955
Lingua: Inglese
Da: AussieBookSeller, Truganina, VIC, Australia
EUR 134,56
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques. IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11a based wirelessA networks, IP-based multimedia communications over wireless networks are also drawingA extensive attention in both academia and industry. Due to the opennessA and distributed nature of the protocols involved, such as the session initiation protocolA (SIP) and the IEEE 802:11a standard, it becomes easy for malicious users inA the network to achieve their own gain or disrupt the service by deviating from theA normal protocol behaviors.A This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11a or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processin Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Editore: Springer-Verlag New York Inc., 2013
ISBN 10: 1461489954 ISBN 13: 9781461489955
Lingua: Inglese
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 67,55
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 189.
Da: Majestic Books, Hounslow, Regno Unito
EUR 75,00
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand pp. 98 31 Illus.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 76,60
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND pp. 98.