Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2015
|
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | DE-634 DE-Aug4 DE-573 DE-M347 DE-92 DE-859 DE-860 DE-861 DE-473 DE-19 DE-355 DE-703 DE-20 DE-29 DE-739 URL des Erstveröffentlichers Inhaltsverzeichnis Abstract |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043209132 | ||
003 | DE-604 | ||
005 | 20160727 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 xx a||| o|||| 00||| eng d | ||
020 | |a 9783319232881 |c Online |9 978-3-319-23288-1 | ||
024 | 7 | |a 10.1007/978-3-319-23288-1 |2 doi | |
035 | |a (OCoLC)932030828 | ||
035 | |a (DE-599)BVBBV043209132 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Lu, Zhou |e Verfasser |4 aut | |
245 | 1 | 0 | |a Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications |c by Zhou Lu, Wenye Wang, Cliff Wang |
264 | 1 | |a Cham |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 116 Seiten) |b 59 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science |x 2191-5768 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Telekommunikation |0 (DE-588)4341131-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 2 | |a Mobile Telekommunikation |0 (DE-588)4341131-9 |D s |
689 | 0 | 3 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Wang, Wenye |e Verfasser |4 aut | |
700 | 1 | |a Wang, Cliff |e Verfasser |0 (DE-588)1047455986 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-23287-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-23288-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028632293 | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23288-1 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819604320773996544 |
---|---|
adam_text | MODELING AND EVALUATING DENIAL OF SERVICE ATTACKS FOR WIRELESS AND
MOBILE APPLICATIONS
/ LU, ZHOU
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
MODELING AND EVALUATION OF BACKOFF MISBEHAVING NODES IN CSMA/CA NETWORKS
MODELING THE IMPACT OF JAMMING ATTACKS ON TIME-CRITICAL TRAFFIC WITH
APPLICATIONS TO SMART GRID
MINIMIZING MESSAGE DELAY OF TIME-CRITICAL TRAFFIC FOR WIRELESS SMART
GRID APPLICATIONS UNDER JAMMING
UNDERSTANDING THE RESILIENCE OF MOBILE CLOUD SERVICES TO MALWARE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
MODELING AND EVALUATING DENIAL OF SERVICE ATTACKS FOR WIRELESS AND
MOBILE APPLICATIONS
/ LU, ZHOU
: 2015
ABSTRACT / INHALTSTEXT
THIS SPRINGERBRIEF COVERS MODELING AND ANALYSIS OF DENIAL-OF-SERVICE
ATTACKS IN EMERGING WIRELESS AND MOBILE APPLICATIONS. IT USES AN
APPLICATION-SPECIFIC METHODOLOGY TO MODEL AND EVALUATE DENIAL-OF-SERVICE
ATTACKS. THREE EMERGING APPLICATIONS ARE EXPLORED: MULTI-MODAL CSMA/CA
NETWORKS, TIME-CRITICAL NETWORKS FOR THE SMART GRID, AND SMART PHONE
APPLICATIONS. THE AUTHORS DEFINE A NEW PERFORMANCE METRIC TO QUANTIFY
THE BENEFITS OF BACKOFF MISBEHAVIOR AND SHOW THE IMPACTS OF A WIDE RANGE
OF BACKOFF MISHANDLING NODES ON THE NETWORK PERFORMANCE, AND PROPOSE A
SCHEME TO MINIMIZE THE DELAY OF TIME-CRITICAL MESSAGE DELIVERY UNDER
JAMMING ATTACKS IN SMART GRID APPLICATIONS. AN INVESTIGATION ON THE
RESILIENCE OF MOBILE SERVICES AGAINST MALWARE ATTACKS IS INCLUDED TO
ADVANCE UNDERSTANDING OF NETWORK VULNERABILITIES ASSOCIATED WITH
EMERGING WIRELESS NETWORKS AND OFFERS INSTRUMENTAL GUIDANCE INTO THE
SECURITY DESIGN FOR FUTURE WIRELESS AND MOBILE APPLICATIONS. THIS BOOK
IS APPROPRIATE FOR STUDENTS, FACULTY, ENGINEERS, AND EXPERTS IN THE
TECHNICAL AREA OF WIRELESS COMMUNICATION, MOBILE NETWORKS AND CYBER
SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Lu, Zhou Wang, Wenye Wang, Cliff |
author_GND | (DE-588)1047455986 |
author_facet | Lu, Zhou Wang, Wenye Wang, Cliff |
author_role | aut aut aut |
author_sort | Lu, Zhou |
author_variant | z l zl w w ww c w cw |
building | Verbundindex |
bvnumber | BV043209132 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)932030828 (DE-599)BVBBV043209132 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-23288-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04543nam a2200841zc 4500</leader><controlfield tag="001">BV043209132</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160727 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319232881</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-23288-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-23288-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932030828</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209132</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lu, Zhou</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications</subfield><subfield code="c">by Zhou Lu, Wenye Wang, Cliff Wang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 116 Seiten)</subfield><subfield code="b">59 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield><subfield code="x">2191-5768</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Wenye</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Cliff</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1047455986</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-23287-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632293</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23288-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209132 |
illustrated | Illustrated |
indexdate | 2024-12-24T04:48:31Z |
institution | BVB |
isbn | 9783319232881 |
issn | 2191-5768 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632293 |
oclc_num | 932030828 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XIII, 116 Seiten) 59 Illustrationen (farbig) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spellingShingle | Lu, Zhou Wang, Wenye Wang, Cliff Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications Computer science Computer communication systems Computer security Computer Science Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Informatik Informatik (DE-588)4026894-9 gnd Datensicherung (DE-588)4011144-1 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Computersicherheit (DE-588)4274324-2 gnd Intelligentes Stromnetz (DE-588)7708028-2 gnd Mobile Telekommunikation (DE-588)4341131-9 gnd |
subject_GND | (DE-588)4026894-9 (DE-588)4011144-1 (DE-588)4633975-9 (DE-588)4274324-2 (DE-588)7708028-2 (DE-588)4341131-9 |
title | Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications |
title_auth | Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications |
title_exact_search | Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications |
title_full | Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications by Zhou Lu, Wenye Wang, Cliff Wang |
title_fullStr | Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications by Zhou Lu, Wenye Wang, Cliff Wang |
title_full_unstemmed | Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications by Zhou Lu, Wenye Wang, Cliff Wang |
title_short | Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications |
title_sort | modeling and evaluating denial of service attacks for wireless and mobile applications |
topic | Computer science Computer communication systems Computer security Computer Science Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Informatik Informatik (DE-588)4026894-9 gnd Datensicherung (DE-588)4011144-1 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Computersicherheit (DE-588)4274324-2 gnd Intelligentes Stromnetz (DE-588)7708028-2 gnd Mobile Telekommunikation (DE-588)4341131-9 gnd |
topic_facet | Computer science Computer communication systems Computer security Computer Science Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Informatik Datensicherung Drahtloses lokales Netz Computersicherheit Intelligentes Stromnetz Mobile Telekommunikation |
url | https://doi.org/10.1007/978-3-319-23288-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632293&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT luzhou modelingandevaluatingdenialofserviceattacksforwirelessandmobileapplications AT wangwenye modelingandevaluatingdenialofserviceattacksforwirelessandmobileapplications AT wangcliff modelingandevaluatingdenialofserviceattacksforwirelessandmobileapplications |