Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Author: Zhou Lu
Publisher: Springer
Total Pages: 128
Release: 2015-11-05
Genre: Computers
ISBN: 3319232886

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

Proceedings of Fourth International Conference on Computer and Communication Technologies

Proceedings of Fourth International Conference on Computer and Communication Technologies
Author: K. Ashoka Reddy
Publisher: Springer Nature
Total Pages: 657
Release: 2023-03-29
Genre: Technology & Engineering
ISBN: 9811985634

The book is a compilation of high-quality scientific papers presented at the 4th International Conference on Computer & Communication Technologies (IC3T 2022). The book covers cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, and web intelligence.

Proceedings of the 5th International Conference on Big Data and Internet of Things

Proceedings of the 5th International Conference on Big Data and Internet of Things
Author: Mohamed Lazaar
Publisher: Springer Nature
Total Pages: 600
Release: 2022-07-03
Genre: Computers
ISBN: 3031079698

This book is a collection of papers in the research area of big data, cloud computing, cybersecurity, machine learning, deep learning, e-learning, Internet of Things, reinforcement learning, information system, social media and natural language processing. This book includes papers presented at the 5th International Conference on Big Data Cloud and Internet of Things, BDIoT 2021 during March 17–18, 2021, at ENSIAS, Mohammed V University in Rabat, Morocco.

Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime
Author: Marcus K. Rogers
Publisher: Springer
Total Pages: 339
Release: 2013-10-01
Genre: Computers
ISBN: 364239891X

This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA. The 20 papers in this volume are grouped in the following topical sections: cloud investigation; malware; behavioral; law; mobile device forensics; and cybercrime investigations.

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Author: Dawson, Maurice
Publisher: IGI Global
Total Pages: 389
Release: 2015-04-30
Genre: Computers
ISBN: 1466683465

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Modelling, Analysis, and Simulation of Computer and Telecommunication Systems

Modelling, Analysis, and Simulation of Computer and Telecommunication Systems
Author: Maria Carla Calzarossa
Publisher: Springer Nature
Total Pages: 279
Release: 2021-01-28
Genre: Computers
ISBN: 3030681106

This book constitutes the post proceedings of the 28th International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2020, held online -due to COVID -19- in Nice, France, in November 2020. The 17 full papers presented were carefully reviewed and selected from 124 submissions. The symposium collected the most relevant papers describing state-of-the-art research in the areas of the performance evaluation of computer systems and networks as well as in related areas.

Research Anthology on Combating Denial-of-Service Attacks

Research Anthology on Combating Denial-of-Service Attacks
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 655
Release: 2020-08-31
Genre: Computers
ISBN: 1799853497

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers. Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Foundations and Practice of Security

Foundations and Practice of Security
Author: Frédéric Cuppens
Publisher: Springer
Total Pages: 361
Release: 2016-12-28
Genre: Computers
ISBN: 3319519662

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.