logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Accountability And Privacy In Network Security 1st Edition Yuxiang Ma

  • SKU: BELL-11837956
Accountability And Privacy In Network Security 1st Edition Yuxiang Ma
$ 31.00 $ 45.00 (-31%)

5.0

88 reviews

Accountability And Privacy In Network Security 1st Edition Yuxiang Ma instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 4.07 MB
Pages: 152
Author: Yuxiang Ma, Yulei Wu, Jingguo Ge
ISBN: 9789811565748, 9789811565755, 9811565740, 9811565759
Language: English
Year: 2020
Edition: 1st Edition

Product desciption

Accountability And Privacy In Network Security 1st Edition Yuxiang Ma by Yuxiang Ma, Yulei Wu, Jingguo Ge 9789811565748, 9789811565755, 9811565740, 9811565759 instant download after payment.

This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. 

 Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.

Related Products