logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Intrusion Detection For Ipbased Multimedia Communications Over Wireless Networks 1st Edition Jin Tang

  • SKU: BELL-4345370
Intrusion Detection For Ipbased Multimedia Communications Over Wireless Networks 1st Edition Jin Tang
$ 31.00 $ 45.00 (-31%)

4.4

92 reviews

Intrusion Detection For Ipbased Multimedia Communications Over Wireless Networks 1st Edition Jin Tang instant download after payment.

Publisher: Springer-Verlag New York
File Extension: PDF
File size: 1.34 MB
Pages: 86
Author: Jin Tang, Yu Cheng (auth.)
ISBN: 9781461489955, 9781461489962, 1461489954, 1461489962
Language: English
Year: 2013
Edition: 1

Product desciption

Intrusion Detection For Ipbased Multimedia Communications Over Wireless Networks 1st Edition Jin Tang by Jin Tang, Yu Cheng (auth.) 9781461489955, 9781461489962, 1461489954, 1461489962 instant download after payment.

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

Related Products