Vendeur : WeBuyBooks, Rossendale, LANCS, Royaume-Uni
EUR 24,79
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 58,51
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Basi6 International, Irving, TX, Etats-Unis
EUR 98,84
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Langue: anglais
Edité par LAP LAMBERT Academic Publishing Apr 2018, 2018
ISBN 10 : 613982723X ISBN 13 : 9786139827237
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 35,90
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities.Books on Demand GmbH, Überseering 33, 22297 Hamburg 84 pp. Englisch.
Langue: anglais
Edité par LAP LAMBERT Academic Publishing, 2018
ISBN 10 : 613982723X ISBN 13 : 9786139827237
Vendeur : preigu, Osnabrück, Allemagne
EUR 33,20
Quantité disponible : 5 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Packet Drop Attack Detection In Mobile Adhoc Networks using ANN | Innocent Mapanga | Taschenbuch | Englisch | 2018 | LAP LAMBERT Academic Publishing | EAN 9786139827237 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Vendeur : Books From California, Simi Valley, CA, Etats-Unis
EUR 103
Quantité disponible : 1 disponible(s)
Ajouter au panierhardcover. Etat : Very Good.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 47,95
Quantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.
Langue: anglais
Edité par GRIN Verlag, GRIN Verlag Mai 2019, 2019
ISBN 10 : 3668943400 ISBN 13 : 9783668943407
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 47,95
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation. After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt 88 pp. Englisch.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 127,38
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 126,21
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. 1st edition NO-PA16APR2015-KAP.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 128,64
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 129,64
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
EUR 129,80
Quantité disponible : 1 disponible(s)
Ajouter au panierHardback. Etat : New. New copy - Usually dispatched within 4 working days.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 129,79
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 137,67
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 190,48
Quantité disponible : 2 disponible(s)
Ajouter au panierHardcover. Etat : Brand New. 240 pages. 9.19x6.13x9.21 inches. In Stock.
Langue: anglais
Edité par LAP LAMBERT Academic Publishing Apr 2018, 2018
ISBN 10 : 613982723X ISBN 13 : 9786139827237
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 35,90
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities. 84 pp. Englisch.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 47,95
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function. 92 pp. Englisch.
Langue: anglais
Edité par LAP LAMBERT Academic Publishing, 2018
ISBN 10 : 613982723X ISBN 13 : 9786139827237
Vendeur : moluna, Greven, Allemagne
EUR 31,27
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Mapanga InnocentInnocent Mapanga was born in Zimbabwe. He received his B.Sc. Honors degree in Computer Science from Bindura University of Science Education, Zimbabwe, in 2008 and an MTech in Computer Science & Engineering from Delhi .
Langue: anglais
Edité par LAP LAMBERT Academic Publishing, 2018
ISBN 10 : 613982723X ISBN 13 : 9786139827237
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 37,20
Quantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities.
Vendeur : preigu, Osnabrück, Allemagne
EUR 47,95
Quantité disponible : 5 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Detection of Primary User Emulation Attack in Cognitive Radio Networks based on TDOA using Novel Bat Algorithm | Aasia Rehman | Taschenbuch | 92 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668943407 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu Print on Demand.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 126,86
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. Print on Demand.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 130,57
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. PRINT ON DEMAND.
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
EUR 157,50
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHRD. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
EUR 150,04
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHRD. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : moluna, Greven, Allemagne
EUR 113,55
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Dr. Sagar Dhanraj PandeAssistant Professor, Department of Computer Science and Engineering, School of Engineering and Technology, Pimpri Chinchwad University (PCU), Pune, Maharashtra, India.Dr. Sagar Dhanraj Pande has exper.
Vendeur : preigu, Osnabrück, Allemagne
EUR 157,35
Quantité disponible : 5 disponible(s)
Ajouter au panierBuch. Etat : Neu. Networks Attack Detection on 5G Networks using Data Mining Techniques | Sagar Dhanraj Pande (u. a.) | Buch | Einband - fest (Hardcover) | Englisch | 2024 | CRC Press | EAN 9781032530185 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 188,07
Quantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.