Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lu, Zhou (VerfasserIn), Wang, Wenye (VerfasserIn), Wang, Cliff (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham Springer 2015
Schriftenreihe:SpringerBriefs in Computer Science
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-859
DE-860
DE-861
DE-473
DE-19
DE-355
DE-703
DE-20
DE-29
DE-739
URL des Erstveröffentlichers
Inhaltsverzeichnis
Abstract
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV043209132
003 DE-604
005 20160727
007 cr|uuu---uuuuu
008 151215s2015 xx a||| o|||| 00||| eng d
020 |a 9783319232881  |c Online  |9 978-3-319-23288-1 
024 7 |a 10.1007/978-3-319-23288-1  |2 doi 
035 |a (OCoLC)932030828 
035 |a (DE-599)BVBBV043209132 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-19  |a DE-Aug4  |a DE-M347  |a DE-573  |a DE-859  |a DE-703  |a DE-473  |a DE-29  |a DE-20  |a DE-92  |a DE-634  |a DE-860  |a DE-861  |a DE-739 
082 0 |a 005.8  |2 23 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Lu, Zhou  |e Verfasser  |4 aut 
245 1 0 |a Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications  |c by Zhou Lu, Wenye Wang, Cliff Wang 
264 1 |a Cham  |b Springer  |c 2015 
300 |a 1 Online-Ressource (XIII, 116 Seiten)  |b 59 Illustrationen (farbig) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a SpringerBriefs in Computer Science  |x 2191-5768 
650 4 |a Computer science 
650 4 |a Computer communication systems 
650 4 |a Computer security 
650 4 |a Computer Science 
650 4 |a Systems and Data Security 
650 4 |a Computer Communication Networks 
650 4 |a Information Systems Applications (incl. Internet) 
650 4 |a Informatik 
650 0 7 |a Informatik  |0 (DE-588)4026894-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Drahtloses lokales Netz  |0 (DE-588)4633975-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Intelligentes Stromnetz  |0 (DE-588)7708028-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Mobile Telekommunikation  |0 (DE-588)4341131-9  |2 gnd  |9 rswk-swf 
689 0 0 |a Informatik  |0 (DE-588)4026894-9  |D s 
689 0 1 |a Drahtloses lokales Netz  |0 (DE-588)4633975-9  |D s 
689 0 2 |a Mobile Telekommunikation  |0 (DE-588)4341131-9  |D s 
689 0 3 |a Intelligentes Stromnetz  |0 (DE-588)7708028-2  |D s 
689 0 4 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 5 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |5 DE-604 
700 1 |a Wang, Wenye  |e Verfasser  |4 aut 
700 1 |a Wang, Cliff  |e Verfasser  |0 (DE-588)1047455986  |4 aut 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-3-319-23287-4 
856 4 0 |u https://doi.org/10.1007/978-3-319-23288-1  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2015 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028632293 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-Aug4  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-92  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-859  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-860  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-861  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-29  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-23288-1  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819604320773996544
adam_text MODELING AND EVALUATING DENIAL OF SERVICE ATTACKS FOR WIRELESS AND MOBILE APPLICATIONS / LU, ZHOU : 2015 TABLE OF CONTENTS / INHALTSVERZEICHNIS MODELING AND EVALUATION OF BACKOFF MISBEHAVING NODES IN CSMA/CA NETWORKS MODELING THE IMPACT OF JAMMING ATTACKS ON TIME-CRITICAL TRAFFIC WITH APPLICATIONS TO SMART GRID MINIMIZING MESSAGE DELAY OF TIME-CRITICAL TRAFFIC FOR WIRELESS SMART GRID APPLICATIONS UNDER JAMMING UNDERSTANDING THE RESILIENCE OF MOBILE CLOUD SERVICES TO MALWARE DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. MODELING AND EVALUATING DENIAL OF SERVICE ATTACKS FOR WIRELESS AND MOBILE APPLICATIONS / LU, ZHOU : 2015 ABSTRACT / INHALTSTEXT THIS SPRINGERBRIEF COVERS MODELING AND ANALYSIS OF DENIAL-OF-SERVICE ATTACKS IN EMERGING WIRELESS AND MOBILE APPLICATIONS. IT USES AN APPLICATION-SPECIFIC METHODOLOGY TO MODEL AND EVALUATE DENIAL-OF-SERVICE ATTACKS. THREE EMERGING APPLICATIONS ARE EXPLORED: MULTI-MODAL CSMA/CA NETWORKS, TIME-CRITICAL NETWORKS FOR THE SMART GRID, AND SMART PHONE APPLICATIONS. THE AUTHORS DEFINE A NEW PERFORMANCE METRIC TO QUANTIFY THE BENEFITS OF BACKOFF MISBEHAVIOR AND SHOW THE IMPACTS OF A WIDE RANGE OF BACKOFF MISHANDLING NODES ON THE NETWORK PERFORMANCE, AND PROPOSE A SCHEME TO MINIMIZE THE DELAY OF TIME-CRITICAL MESSAGE DELIVERY UNDER JAMMING ATTACKS IN SMART GRID APPLICATIONS. AN INVESTIGATION ON THE RESILIENCE OF MOBILE SERVICES AGAINST MALWARE ATTACKS IS INCLUDED TO ADVANCE UNDERSTANDING OF NETWORK VULNERABILITIES ASSOCIATED WITH EMERGING WIRELESS NETWORKS AND OFFERS INSTRUMENTAL GUIDANCE INTO THE SECURITY DESIGN FOR FUTURE WIRELESS AND MOBILE APPLICATIONS. THIS BOOK IS APPROPRIATE FOR STUDENTS, FACULTY, ENGINEERS, AND EXPERTS IN THE TECHNICAL AREA OF WIRELESS COMMUNICATION, MOBILE NETWORKS AND CYBER SECURITY DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author Lu, Zhou
Wang, Wenye
Wang, Cliff
author_GND (DE-588)1047455986
author_facet Lu, Zhou
Wang, Wenye
Wang, Cliff
author_role aut
aut
aut
author_sort Lu, Zhou
author_variant z l zl
w w ww
c w cw
building Verbundindex
bvnumber BV043209132
classification_rvk ST 276
ST 277
collection ZDB-2-SCS
ctrlnum (OCoLC)932030828
(DE-599)BVBBV043209132
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-23288-1
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04543nam a2200841zc 4500</leader><controlfield tag="001">BV043209132</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160727 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319232881</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-23288-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-23288-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932030828</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209132</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lu, Zhou</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications</subfield><subfield code="c">by Zhou Lu, Wenye Wang, Cliff Wang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 116 Seiten)</subfield><subfield code="b">59 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield><subfield code="x">2191-5768</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Wenye</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Cliff</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1047455986</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-23287-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028632293&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028632293&amp;sequence=000003&amp;line_number=0002&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632293</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043209132
illustrated Illustrated
indexdate 2024-12-24T04:48:31Z
institution BVB
isbn 9783319232881
issn 2191-5768
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028632293
oclc_num 932030828
open_access_boolean
owner DE-355
DE-BY-UBR
DE-19
DE-BY-UBM
DE-Aug4
DE-M347
DE-573
DE-859
DE-703
DE-473
DE-BY-UBG
DE-29
DE-20
DE-92
DE-634
DE-860
DE-861
DE-739
owner_facet DE-355
DE-BY-UBR
DE-19
DE-BY-UBM
DE-Aug4
DE-M347
DE-573
DE-859
DE-703
DE-473
DE-BY-UBG
DE-29
DE-20
DE-92
DE-634
DE-860
DE-861
DE-739
physical 1 Online-Ressource (XIII, 116 Seiten) 59 Illustrationen (farbig)
psigel ZDB-2-SCS
ZDB-2-SCS_2015
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Springer
record_format marc
series2 SpringerBriefs in Computer Science
spellingShingle Lu, Zhou
Wang, Wenye
Wang, Cliff
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Computer science
Computer communication systems
Computer security
Computer Science
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Informatik
Informatik (DE-588)4026894-9 gnd
Datensicherung (DE-588)4011144-1 gnd
Drahtloses lokales Netz (DE-588)4633975-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Intelligentes Stromnetz (DE-588)7708028-2 gnd
Mobile Telekommunikation (DE-588)4341131-9 gnd
subject_GND (DE-588)4026894-9
(DE-588)4011144-1
(DE-588)4633975-9
(DE-588)4274324-2
(DE-588)7708028-2
(DE-588)4341131-9
title Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
title_auth Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
title_exact_search Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
title_full Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications by Zhou Lu, Wenye Wang, Cliff Wang
title_fullStr Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications by Zhou Lu, Wenye Wang, Cliff Wang
title_full_unstemmed Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications by Zhou Lu, Wenye Wang, Cliff Wang
title_short Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
title_sort modeling and evaluating denial of service attacks for wireless and mobile applications
topic Computer science
Computer communication systems
Computer security
Computer Science
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Informatik
Informatik (DE-588)4026894-9 gnd
Datensicherung (DE-588)4011144-1 gnd
Drahtloses lokales Netz (DE-588)4633975-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Intelligentes Stromnetz (DE-588)7708028-2 gnd
Mobile Telekommunikation (DE-588)4341131-9 gnd
topic_facet Computer science
Computer communication systems
Computer security
Computer Science
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Informatik
Datensicherung
Drahtloses lokales Netz
Computersicherheit
Intelligentes Stromnetz
Mobile Telekommunikation
url https://doi.org/10.1007/978-3-319-23288-1
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT luzhou modelingandevaluatingdenialofserviceattacksforwirelessandmobileapplications
AT wangwenye modelingandevaluatingdenialofserviceattacksforwirelessandmobileapplications
AT wangcliff modelingandevaluatingdenialofserviceattacksforwirelessandmobileapplications