0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Network Behavior Analysis - Measurement, Models, and Applications (Paperback, 1st ed. 2022): Kuai Xu Network Behavior Analysis - Measurement, Models, and Applications (Paperback, 1st ed. 2022)
Kuai Xu
R3,979 Discovery Miles 39 790 Ships in 18 - 22 working days

This book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet "objects" such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks. The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections. The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications.

Modeling Information Diffusion in Online Social Networks with Partial Differential Equations (Paperback, 1st ed. 2020): Haiyan... Modeling Information Diffusion in Online Social Networks with Partial Differential Equations (Paperback, 1st ed. 2020)
Haiyan Wang, Feng Wang, Kuai Xu
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

The book lies at the interface of mathematics, social media analysis, and data science. Its authors aim to introduce a new dynamic modeling approach to the use of partial differential equations for describing information diffusion over online social networks. The eigenvalues and eigenvectors of the Laplacian matrix for the underlying social network are used to find communities (clusters) of online users. Once these clusters are embedded in a Euclidean space, the mathematical models, which are reaction-diffusion equations, are developed based on intuitive social distances between clusters within the Euclidean space. The models are validated with data from major social media such as Twitter. In addition, mathematical analysis of these models is applied, revealing insights into information flow on social media. Two applications with geocoded Twitter data are included in the book: one describing the social movement in Twitter during the Egyptian revolution in 2011 and another predicting influenza prevalence. The new approach advocates a paradigm shift for modeling information diffusion in online social networks and lays the theoretical groundwork for many spatio-temporal modeling problems in the big-data era.

Wireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015,... Wireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings (Paperback, 1st ed. 2015)
Kuai Xu, Haojin Zhu
R1,564 Discovery Miles 15 640 Ships in 18 - 22 working days

This book constitutes the proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015, held in Qufu, Shandong, China, in August 2015. The 36 revised full papers presented together with 5 revised short papers and 42 invited papers were carefully reviewed and selected from 133 initial submissions. The papers present current trends, challenges, and state-of-the-art solutions related to various issues in wireless networks. Topics of interests include effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks. .

Network Behavior Analysis - Measurement, Models, and Applications (Hardcover, 1st ed. 2022): Kuai Xu Network Behavior Analysis - Measurement, Models, and Applications (Hardcover, 1st ed. 2022)
Kuai Xu
R3,519 Discovery Miles 35 190 Ships in 10 - 15 working days

This book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet "objects" such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks. The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections. The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Die Lewe Is 'n Asem Lank - Gedigte Oor…
Frieda van den Heever Hardcover R320 R286 Discovery Miles 2 860
Algorithms and Applications - ALAP 2018
Sajal K. Das, Nabendu Chaki Hardcover R4,691 Discovery Miles 46 910
The Kind Worth Saving
Peter Swanson Paperback R355 R280 Discovery Miles 2 800
The Algebra Of Insignificance
Stephen Symons Paperback R180 R167 Discovery Miles 1 670
The Analecta
Harshvardhan Rai Paperback R267 Discovery Miles 2 670
Knapsekerels
Pieter Fourie Paperback R215 Discovery Miles 2 150
What The Moon Gave Her
Christi Steyn Paperback R340 R308 Discovery Miles 3 080
The Lost Boys
Faye Kellerman Paperback R330 R227 Discovery Miles 2 270
Computers and the Teaching of Writing in…
Gail E Hawisher, Paul Le Blanc, … Hardcover R2,549 Discovery Miles 25 490
Zeus Van Wyngaardt En Die Skrikgodin
Julio Agrella Paperback R333 Discovery Miles 3 330

 

Partners