Distributed denial of service attacks: concepts, mathematical and cryptographic solutions
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Berlin
De Gruyter
[2021]
|
Schriftenreihe: | De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences
volume 6 |
Schlagwörter: | |
Links: | https://www.degruyter.com/books/9783110616750 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032783241&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XIV, 218 Seiten Illustrationen, Diagramme 24 cm x 17 cm |
ISBN: | 9783110616750 3110616750 |
Internformat
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV047381690 | ||
003 | DE-604 | ||
005 | 20211108 | ||
007 | t| | ||
008 | 210722s2021 gw a||| |||| 00||| eng d | ||
015 | |a 20,N41 |2 dnb | ||
016 | 7 | |a 1218800070 |2 DE-101 | |
020 | |a 9783110616750 |c : EUR 129.95 (DE) (freier Preis), EUR 129.95 (AT) (freier Preis) |9 978-3-11-061675-0 | ||
020 | |a 3110616750 |9 3-11-061675-0 | ||
024 | 3 | |a 9783110616750 | |
035 | |a (OCoLC)1268186605 | ||
035 | |a (DE-599)DNB1218800070 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-355 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |8 1\p |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Distributed denial of service attacks |b concepts, mathematical and cryptographic solutions |c edited by Rajeev Singh and Mangey Ram |
264 | 1 | |a Berlin |b De Gruyter |c [2021] | |
300 | |a XIV, 218 Seiten |b Illustrationen, Diagramme |c 24 cm x 17 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences |v volume 6 | |
650 | 0 | 7 | |a Fuzzy-Logik |0 (DE-588)4341284-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
653 | |a IT-Sicherheit | ||
653 | |a Fuzzy Logik | ||
653 | |a Informatik | ||
653 | |a Neuronaleas Netz | ||
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Fuzzy-Logik |0 (DE-588)4341284-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Singh, Rajeev |4 edt | |
700 | 1 | |a Ram, Mangey |d 1980- |0 (DE-588)1144926335 |4 edt | |
710 | 2 | |a Walter de Gruyter GmbH & Co. KG |0 (DE-588)10095502-2 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 978-3-11-061975-1 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-3-11-061985-0 |
830 | 0 | |a De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences |v volume 6 |w (DE-604)BV046978343 |9 6 | |
856 | 4 | 2 | |m X:MVB |u https://www.degruyter.com/books/9783110616750 |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032783241&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a vlb |d 20201002 |q DE-101 |u https://d-nb.info/provenance/plan#vlb | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032783241 |
Datensatz im Suchindex
_version_ | 1819341166220410880 |
---|---|
adam_text | CONTENTS
PREFACE
-
V
ACKNOWLEDGMENTS
-
VII
ABOUT
THE
EDITORS
-
IX
LIST
OF
CONTRIBUTORS
-
XIII
RONIERISON
MACIEL,
JEAN
ARAUJO,
CARLOS
MELO,
PAULO
PEREIRA,
JAMILSON
DANTAS,
PAULO
MACIEL
IMPACT
EVALUATION
OF
DDOS
AND
MALWARE
ATTACK
USING
LOT
DEVICES
-
1
ANSHU
BHASIN,
ANKITA
SHARMA
UNDERSTANDING
AND
IMPLEMENTATION
OF
MACHINE
LEARNING
USING
SUPPORT
VECTOR
MACHINE
FOR
EFFICIENT
DDOS
ATTACK
DETECTION
-
29
MUZAFER
SARACEVIC,
SELVER
PEPIC,
FADIL
NOVALIC
CRYPTOGRAPHIC
METHOD
BASED
ON
CATALAN
OBJECTS
AND
ENUMERATIVE
CHESS
PROBLEM
-
51
ROHIT
SINGH,
LALIT
KUMAR
AWASTHI,
K.
P.
SHARMA
DISTRIBUTED
DENIAL-OF-SERVICE
ATTACKS
AND
MITIGATION
IN
WIRELESS
SENSOR
NETWORKS
-
67
MARIA
NENOVA,
GEORGI
KIEV,
SHAIKH
JAVED
RASHEED,
KARUNA
SURYAKANT
BHOSALE
NEW
TECHNIQUES
FOR
DDOS
ATTACKS
MITIGATION
IN
RESOURCE-CONSTRAINED
NETWORKS
-
83
MAHESH
BANERJEE
DETECTION
AND
BEHAVIORAL
ANALYSIS
OF
BOTNETS
USING
HONEYNETS
AND
CLASSIFICATION
TECHNIQUES
-
131
RAJEEV
SINGH,
T.
P.
SHARMA
SELECTED
PRACTICAL
AND
EFFECTIVE
TECHNIQUES
TO
COMBAT
DISTRIBUTED
DENIAL-OF
SERVICE
(DDOS)
ATTACKS
-
159
XII
-
CONTENTS
SHIKHA
GOSWAMI,
GOVIND
VERMA
PROBABILITY,
QUEUING,
AND
STATISTICAL
PERSPECTIVE
IN
THE
DISTRIBUTED
DENIAL-OF
SERVICE
ATTACKS
DOMAIN
-
173
RICHA
PANDEY,
MAHESH
BANERJEE
FREQUENTLY
USED
MACHINE
LEARNING
ALGORITHM
FOR
DETECTING
THE
DISTRIBUTED
DENIAL-OF-SERVICE
(DDOS)
ATTACKS
----
189
RAKESH
CHANDRA
BHADULA,
V.N.
KALA,
AMIT
KUMAR
MISHRA,
DEEPAK
KHOLIYA
UTILIZATION
OF
PUZZLES
FOR
PROTECTION
AGAINST
DDOS
ATTACKS
-
203
INDEX
-
217
|
any_adam_object | 1 |
author2 | Singh, Rajeev Ram, Mangey 1980- |
author2_role | edt edt |
author2_variant | r s rs m r mr |
author_GND | (DE-588)1144926335 |
author_facet | Singh, Rajeev Ram, Mangey 1980- |
building | Verbundindex |
bvnumber | BV047381690 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1268186605 (DE-599)DNB1218800070 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02417nam a22005538cb4500</leader><controlfield tag="001">BV047381690</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211108 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">210722s2021 gw a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">20,N41</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1218800070</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110616750</subfield><subfield code="c">: EUR 129.95 (DE) (freier Preis), EUR 129.95 (AT) (freier Preis)</subfield><subfield code="9">978-3-11-061675-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3110616750</subfield><subfield code="9">3-11-061675-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783110616750</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1268186605</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1218800070</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Distributed denial of service attacks</subfield><subfield code="b">concepts, mathematical and cryptographic solutions</subfield><subfield code="c">edited by Rajeev Singh and Mangey Ram</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 218 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">24 cm x 17 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences</subfield><subfield code="v">volume 6</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fuzzy-Logik</subfield><subfield code="0">(DE-588)4341284-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT-Sicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fuzzy Logik</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Informatik</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Neuronaleas Netz</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Fuzzy-Logik</subfield><subfield code="0">(DE-588)4341284-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Rajeev</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ram, Mangey</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1144926335</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Walter de Gruyter GmbH & Co. KG</subfield><subfield code="0">(DE-588)10095502-2</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-3-11-061975-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-3-11-061985-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences</subfield><subfield code="v">volume 6</subfield><subfield code="w">(DE-604)BV046978343</subfield><subfield code="9">6</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="u">https://www.degruyter.com/books/9783110616750</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032783241&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">vlb</subfield><subfield code="d">20201002</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#vlb</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032783241</subfield></datafield></record></collection> |
id | DE-604.BV047381690 |
illustrated | Illustrated |
indexdate | 2024-12-20T19:17:54Z |
institution | BVB |
institution_GND | (DE-588)10095502-2 |
isbn | 9783110616750 3110616750 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032783241 |
oclc_num | 1268186605 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XIV, 218 Seiten Illustrationen, Diagramme 24 cm x 17 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | De Gruyter |
record_format | marc |
series | De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences |
series2 | De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences |
spellingShingle | Distributed denial of service attacks concepts, mathematical and cryptographic solutions De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences Fuzzy-Logik (DE-588)4341284-1 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4341284-1 (DE-588)4033329-2 |
title | Distributed denial of service attacks concepts, mathematical and cryptographic solutions |
title_auth | Distributed denial of service attacks concepts, mathematical and cryptographic solutions |
title_exact_search | Distributed denial of service attacks concepts, mathematical and cryptographic solutions |
title_full | Distributed denial of service attacks concepts, mathematical and cryptographic solutions edited by Rajeev Singh and Mangey Ram |
title_fullStr | Distributed denial of service attacks concepts, mathematical and cryptographic solutions edited by Rajeev Singh and Mangey Ram |
title_full_unstemmed | Distributed denial of service attacks concepts, mathematical and cryptographic solutions edited by Rajeev Singh and Mangey Ram |
title_short | Distributed denial of service attacks |
title_sort | distributed denial of service attacks concepts mathematical and cryptographic solutions |
title_sub | concepts, mathematical and cryptographic solutions |
topic | Fuzzy-Logik (DE-588)4341284-1 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Fuzzy-Logik Kryptologie |
url | https://www.degruyter.com/books/9783110616750 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032783241&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV046978343 |
work_keys_str_mv | AT singhrajeev distributeddenialofserviceattacksconceptsmathematicalandcryptographicsolutions AT rammangey distributeddenialofserviceattacksconceptsmathematicalandcryptographicsolutions AT walterdegruytergmbhcokg distributeddenialofserviceattacksconceptsmathematicalandcryptographicsolutions |