Fr. 69.00

Group Testing Theory in Network Security - An Advanced Solution

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.

List of contents

-1. Group Testing (Introduction, Basic Theory and Design, Applications in Network Security). -2.Size Constraint Group Testing and DoS Attacks (Overview, Network System Models, Size Constraint Group Testing, Matrix Construction and Latency Analyses, Detection System Configuration, Experimental Analysis). -3. Interference Free Group Testing and Reactive Jamming Attacks (Overview, Problem Models and Preliminaries, Group Testing based Trigger Node Identification-Preprocessing, Identifying Trigger Nodes(ITN) Algorithm, Theoretical Analysis, Experimental Analysis). -4. Randomized Fault Tolerant Group Testing and Advanced Security (Advanced Attacker Model, Error-tolerant Randomized Non-Adaptive Group Testing, Clique-Independent Set, Advanced Trigger Node Identification, Advanced Solutions Toward Sophisticated Attack Models, Experimental Analysis). -5. Outlooks (General Detection Framework based on Group Testing, Size Constraint Group Testing, Jamming Attacks and Trigger Node Detection).-References. - Index.

Summary

Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.

Additional text

From the reviews:
“The topic of this monograph is at the crossroads of optimization, network security, graph theory, and algorithmic complexity. … The monograph is written in a compact and precise style. … Given the network architecture of modern communications, the topic is certainly timely. In sum, this monograph provides advanced solutions based on group testing to some particular threats to network security. Therefore, it is going to be very useful for researchers seeking a brief introduction to the state-of-art of this new and specialized methodology.” (José M. Amigó, Mathematical Reviews, January, 2013)

Report

From the reviews:
"The topic of this monograph is at the crossroads of optimization, network security, graph theory, and algorithmic complexity. ... The monograph is written in a compact and precise style. ... Given the network architecture of modern communications, the topic is certainly timely. In sum, this monograph provides advanced solutions based on group testing to some particular threats to network security. Therefore, it is going to be very useful for researchers seeking a brief introduction to the state-of-art of this new and specialized methodology." (José M. Amigó, Mathematical Reviews, January, 2013)

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.