000 | 03423nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-981-15-6575-5 | ||
003 | DE-He213 | ||
005 | 20240423125231.0 | ||
007 | cr nn 008mamaa | ||
008 | 200915s2020 si | s |||| 0|eng d | ||
020 |
_a9789811565755 _9978-981-15-6575-5 |
||
024 | 7 |
_a10.1007/978-981-15-6575-5 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aMa, Yuxiang. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aAccountability and Privacy in Network Security _h[electronic resource] / _cby Yuxiang Ma, Yulei Wu, Jingguo Ge. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aXII, 140 p. 62 illus., 59 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary. | |
520 | _aThis book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity. | ||
650 | 0 | _aComputer networks . | |
650 | 0 | _aData protection. | |
650 | 0 |
_aElectronic digital computers _xEvaluation. |
|
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aSystem Performance and Evaluation. |
700 | 1 |
_aWu, Yulei. _eauthor. _0(orcid)0000-0003-0801-8443 _1https://orcid.org/0000-0003-0801-8443 _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aGe, Jingguo. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811565748 |
776 | 0 | 8 |
_iPrinted edition: _z9789811565762 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-15-6575-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c175706 _d175706 |