0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (6)
  • -
Status
Brand

Showing 1 - 14 of 14 matches in All Departments

Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019): Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu,... Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019)
Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, …
R3,513 Discovery Miles 35 130 Ships in 10 - 15 working days

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Distributed Network Systems - From Concepts to Implementations (Hardcover, 2005 ed.): Weijia Jia, Wanlei Zhou Distributed Network Systems - From Concepts to Implementations (Hardcover, 2005 ed.)
Weijia Jia, Wanlei Zhou
R3,098 Discovery Miles 30 980 Ships in 12 - 17 working days

Both authors have taught the course of "Distributed Systems" for many years in the respective schools. During the teaching, we feel strongly that "Distributed systems" have evolved from traditional "LAN" based distributed systems towards "Internet based" systems. Although there exist many excellent textbooks on this topic, because of the fast development of distributed systems and network programming/protocols, we have difficulty in finding an appropriate textbook for the course of "distributed systems" with orientation to the requirement of the undergraduate level study for today's distributed technology. Specifically, from - to-date concepts, algorithms, and models to implementations for both distributed system designs and application programming. Thus the philosophy behind this book is to integrate the concepts, algorithm designs and implementations of distributed systems based on network programming. After using several materials of other textbooks and research books, we found that many texts treat the distributed systems with separation of concepts, algorithm design and network programming and it is very difficult for students to map the concepts of distributed systems to the algorithm design, prototyping and implementations. This book intends to enable readers, especially postgraduates and senior undergraduate level, to study up-to-date concepts, algorithms and network programming skills for building modern distributed systems. It enables students not only to master the concepts of distributed network system but also to readily use the material introduced into implementation practices.

Adversarial Deep Learning in Cybersecurity - Attack Taxonomies, Defence Mechanisms, and Learning Theories (Hardcover, 1st ed.... Adversarial Deep Learning in Cybersecurity - Attack Taxonomies, Defence Mechanisms, and Learning Theories (Hardcover, 1st ed. 2023)
Aneesh Sreevallabh Chivukula, Xinghao Yang, Bo Liu, Wei Liu, Wanlei Zhou
R4,579 Discovery Miles 45 790 Ships in 12 - 17 working days

A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.

Differential Privacy and Applications (Hardcover, 1st ed. 2017): Tianqing Zhu, Wanlei Zhou, Gang Li, Philip S. Yu Differential Privacy and Applications (Hardcover, 1st ed. 2017)
Tianqing Zhu, Wanlei Zhou, Gang Li, Philip S. Yu
R4,605 Discovery Miles 46 050 Ships in 12 - 17 working days

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications. Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.

Distributed Network Systems - From Concepts to Implementations (Paperback, 2005 ed.): Weijia Jia, Wanlei Zhou Distributed Network Systems - From Concepts to Implementations (Paperback, 2005 ed.)
Weijia Jia, Wanlei Zhou
R2,861 Discovery Miles 28 610 Ships in 10 - 15 working days

Both authors have taught the course of "Distributed Systems" for many years in the respective schools. During the teaching, we feel strongly that "Distributed systems" have evolved from traditional "LAN" based distributed systems towards "Internet based" systems. Although there exist many excellent textbooks on this topic, because of the fast development of distributed systems and network programming/protocols, we have difficulty in finding an appropriate textbook for the course of "distributed systems" with orientation to the requirement of the undergraduate level study for today's distributed technology. Specifically, from - to-date concepts, algorithms, and models to implementations for both distributed system designs and application programming. Thus the philosophy behind this book is to integrate the concepts, algorithm designs and implementations of distributed systems based on network programming. After using several materials of other textbooks and research books, we found that many texts treat the distributed systems with separation of concepts, algorithm design and network programming and it is very difficult for students to map the concepts of distributed systems to the algorithm design, prototyping and implementations. This book intends to enable readers, especially postgraduates and senior undergraduate level, to study up-to-date concepts, algorithms and network programming skills for building modern distributed systems. It enables students not only to master the concepts of distributed network system but also to readily use the material introduced into implementation practices.

Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27,... Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
R1,640 Discovery Miles 16 400 Ships in 10 - 15 working days

This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.

Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27,... Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
R1,592 Discovery Miles 15 920 Ships in 10 - 15 working days

This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.

Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings... Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings (Paperback, 2012 ed.)
Yang Xiang, Javier Lopez, C.-C.Jay Kuo, Wanlei Zhou
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.

Distributed and Parallel Computing - 6th International Conference on Algorithms and Architectures for Parallel Processing,... Distributed and Parallel Computing - 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings (Paperback, 2005 ed.)
Michael Hobbs, Andrzej Goscinski, Wanlei Zhou
R1,661 Discovery Miles 16 610 Ships in 10 - 15 working days

There are many applications that require parallel and distributed processing to allow complicated engineering, business and research problems to be solved in a reasonable time. Parallel and distributed processing is able to improve company profit, lower costs of design, production, and deployment of new technologies, and create better business environments. The major lesson learned by car and aircraft engineers, drug manufacturers, genome researchers and other specialist is that a computer system is a very powerful tool that is able to help them solving even more complicated problems. That has led computing specialists to new computer system architecture and exploiting parallel computers, clusters of clusters, and distributed systems in the form of grids. There are also institutions that do not have so complicated problems but would like to improve profit, lower costs of design and production by using parallel and distributed processing on clusters. In general to achieve these goals, parallel and distributed processing must become the computing mainstream. This implies a need for new architectures of parallel and distributed systems, new system management facilities, and new application algorithms. This also implies a need for better understanding of grids and clusters, and in particular their operating systems, scheduling algorithms, load balancing, heterogeneity, transparency, application deployment, which is of the most critical importance for their development and taking them by industry and business.

Advances in Web-Based Learning -- ICWL 2003 - Second International Conference, Melbourne, Australia, August 18-20, 2003,... Advances in Web-Based Learning -- ICWL 2003 - Second International Conference, Melbourne, Australia, August 18-20, 2003, Proceedings (Paperback, 2003 ed.)
Wanlei Zhou, Paul Nicholson, Brian Corbitt, Joseph Fong
R3,043 Discovery Miles 30 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Web-based learning, ICWL 2003, held in Melbourne, Australia in August 2003. The 50 revised full papers presented were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on Web-based learning environments, the virtual university, paedagoical issues, multimedia-based e-learning, interactivity, intelligence in online education, innovative curricula in e-learning, e-learning solutions, and computer supported cooperative learning.

Advances in Web-Based Learning - ICWL 2021 - 20th International Conference, ICWL 2021, Macau, China, November 13-14, 2021,... Advances in Web-Based Learning - ICWL 2021 - 20th International Conference, ICWL 2021, Macau, China, November 13-14, 2021, Proceedings (Paperback, 1st ed. 2021)
Wanlei Zhou, Yi Mu
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This book constitutes the proceedings of the 20th International Conference on Advances in Web-Based Learning, ICWL 2021, which was held in Macau, China, in November 2021. The papers included in this volume deal with multiple topics, from algorithms to systems and applications and are organized in 3 tracks: Online learning methodologies, trust, and analysis; Online learning environment with tools; Online learning privacy issues and special tools.

Delay Tolerant Networks (Paperback, 2015 ed.): Longxiang Gao, Shui Yu, Tom H. Luan, Wanlei Zhou Delay Tolerant Networks (Paperback, 2015 ed.)
Longxiang Gao, Shui Yu, Tom H. Luan, Wanlei Zhou
R1,693 Discovery Miles 16 930 Ships in 10 - 15 working days

This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.

Abhilfemassnahmen in Der Fusionskontrolle Und Ausgleichsmassnahmen in Der Banken-Beihilfenkontrolle - Eine Rechtliche Und... Abhilfemassnahmen in Der Fusionskontrolle Und Ausgleichsmassnahmen in Der Banken-Beihilfenkontrolle - Eine Rechtliche Und OEkonomische Betrachtung (German, Paperback, 2014 ed.)
Wanli Zhou
R1,311 Discovery Miles 13 110 Ships in 10 - 15 working days
Location Privacy in Mobile Applications (Paperback, 1st ed. 2018): Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang Location Privacy in Mobile Applications (Paperback, 1st ed. 2018)
Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Benchmark Series: Microsoft (R) Word…
Nita Rutkosky, Audrey Rutkosky Roggenkamp, … Paperback R5,190 Discovery Miles 51 900
Artificial Intelligence Applications in…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R8,448 Discovery Miles 84 480
Managing Projects with Microsoft Project…
G. Lowery Paperback R1,294 Discovery Miles 12 940
Word Pocket Guide 2e
Walter Glenn Paperback R238 R173 Discovery Miles 1 730
Illustrated Microsoft (R) Office 365…
Carol Cram, Jennifer Duffy Paperback R1,031 R933 Discovery Miles 9 330
Learning Microsoft Word 2007
Suzanne Weixel Loose-leaf R2,656 Discovery Miles 26 560
The Ridiculously Simple Guide to…
Scott La Counte Paperback R620 R521 Discovery Miles 5 210
Beginning Microsoft Word 2010
Ty Anderson, Guy Hart-Davis Paperback R909 R764 Discovery Miles 7 640
Word Processing with Word - Learning…
Keith Brindley Paperback R643 Discovery Miles 6 430
Essential Word 2016
Kevin Wilson Paperback R337 Discovery Miles 3 370

 

Partners