You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
Supercritical Fluid Technology: Theory and Application to Technology Forecasting
This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes. Considering the lack of tolerance of enterprise for operational interruptions or the risks that accompany theft and loss of data, this reference describes how to ensure your organization is prepared for the unexpected. The text also aids in containing liability with guidance on network and application vulnerability assessments, intrusion detection and penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning.
Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collat
Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and considers the theoretical problems in WSN, including issues with monitoring, routing, and power control. It ...
Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current thinking on the topic, and a discussion of unsolved problems. The book is organized into three sect...
Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, i
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to de
Until recently, most network design techniques employed a bottom-up approach with lower protocol layer mechanisms affecting the development of higher ones. This approach, however, has not yielded fascinating results in the case of wireless distributed networks. Addressing the emerging aspects of modern network analysis and design, Evolutionary Dynamics of Complex Communications Networks introduces and develops a top-bottom approach where elements of the higher layer can be exploited in modifying the lowest physical topology—closing the network design loop in an evolutionary fashion similar to that observed in natural processes. This book provides a complete overview of contemporary design ...
Contents:A New Way to Acquire Knowledge (H-Y Wang)An SPN Knowledge Representation Scheme (J Gattiker & N Bourbakis)On the Deep Structures of Word Problems and Their Construction (F Gomez)Resolving Conflicts in Inheritance Reasoning with Statistical Approach (C W Lee)Integrating High and Low Level Computer Vision for Scene Understanding (R Malik & S So)The Evolution of Commercial AI Tools: The First Decade (F Hayes-Roth)Reengineering: The AI Generation — Billions on the Table (J S Minor Jr)An Intelligent Tool for Discovering Data Dependencies in Relational DBS (P Gavaskar & F Golshani)A Case-Based Reasoning (CBR) Tool to Assist Traffic Flow (B Das & S Bayles)A Study of Financial Expert Syst...