000 03436nam a22004695i 4500
003 DE-He213
005 20231104114236.0
007 cr nn 008mamaa
008 151105s2015 gw | s |||| 0|eng d
020 _a9783319232881
_z978-3-319-23288-1
024 7 _a10.1007/978-3-319-23288-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema005.8
_223
100 1 _aLu, Zhou.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aModeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications /
_cby Zhou Lu, Wenye Wang, Cliff Wang.
250 _a1st ed. 2015.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aSpringerBriefs in Computer Science,
_x2191-5768
505 0 _aModeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks -- Modeling the Impact of Jamming Attacks on Time-Critical Traffic with Applications to Smart Grid -- Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications under Jamming -- Understanding the Resilience of Mobile Cloud Services to Malware.
520 _aThis SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.
650 0 _aComputer security.
650 0 _aComputer Communication Networks.
650 1 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aComputer Communication Networks.
_0http://scigraph.springernature.com/things/product-market-codes/I13022
650 2 4 _aInformation Systems Applications (incl. Internet).
_0http://scigraph.springernature.com/things/product-market-codes/I18040
700 1 _aWang, Wenye.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aWang, Cliff.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
856 4 0 _uhttps://doi.org/10.1007/978-3-319-23288-1
_3Springer eBooks
_zOnline access link to the resource
912 _aZDB-2-SCS
999 _c200433894
_d52106
942 _2lcc
_cEBK
041 _aeng