0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Network Classification for Traffic Management - Anomaly detection, feature selection, clustering and classification... Network Classification for Traffic Management - Anomaly detection, feature selection, clustering and classification (Hardcover)
Zahir Tari, Adil Fahad, Abdulmohsen Almalawi, Xun Yi
R3,104 R2,806 Discovery Miles 28 060 Save R298 (10%) Ships in 18 - 22 working days

With the massive increase of data and traffic on the Internet within the 5G, IoT and smart cities frameworks, current network classification and analysis techniques are falling short. Novel approaches using machine learning algorithms are needed to cope with and manage real-world network traffic, including supervised, semi-supervised, and unsupervised classification techniques. Accurate and effective classification of network traffic will lead to better quality of service and more secure and manageable networks. This authored book investigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated enterprise-scale networks. The authors explore novel methods for enhancing network statistics at the transport layer, helping to identify optimal feature selection through a global optimization approach and providing automatic labelling for raw traffic through a SemTra framework to maintain provable privacy on information disclosure properties.

Uniqueness Theory of Meromorphic Functions (Hardcover): Chung-Chun Yang, Hong-Xun Yi Uniqueness Theory of Meromorphic Functions (Hardcover)
Chung-Chun Yang, Hong-Xun Yi
R2,964 Discovery Miles 29 640 Ships in 18 - 22 working days

This book is the first monograph in the field of uniqueness theory of meromorphic functions dealing with conditions under which there is the unique function satisfying given hypotheses. Developed by R. Nevanlinna, a Finnish mathematician, early in the 1920's, research in the field has developed rapidly over the past three decades with a great deal of fruitful results. This book systematically summarizes the most important results in the field, including many of the authors' own previously unpublished results. In addition, useful skills and simple proofs are introduced. This book is suitable for higher level and graduate students who have a basic grounding in complex analysis, but will also appeal to researchers in mathematics.

Homomorphic Encryption and Applications (Paperback, 2014 ed.): Xun Yi, Russell Paulet, Elisa Bertino Homomorphic Encryption and Applications (Paperback, 2014 ed.)
Xun Yi, Russell Paulet, Elisa Bertino
R2,568 Discovery Miles 25 680 Ships in 18 - 22 working days

This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

Uniqueness Theory of Meromorphic Functions (Paperback, Softcover reprint of hardcover 1st ed. 2003): Chung-Chun Yang, Hong-Xun... Uniqueness Theory of Meromorphic Functions (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Chung-Chun Yang, Hong-Xun Yi
R2,728 Discovery Miles 27 280 Ships in 18 - 22 working days

This book is the first monograph in the field of uniqueness theory of meromorphic functions dealing with conditions under which there is the unique function satisfying given hypotheses. Developed by R. Nevanlinna, a Finnish mathematician, early in the 1920's, research in the field has developed rapidly over the past three decades with a great deal of fruitful results. This book systematically summarizes the most important results in the field, including many of the authors' own previously unpublished results. In addition, useful skills and simple proofs are introduced. This book is suitable for higher level and graduate students who have a basic grounding in complex analysis, but will also appeal to researchers in mathematics.

Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th EAI International Conference, QShine 2021,... Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th EAI International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings (Paperback, 1st ed. 2021)
Xingliang Yuan, Wei Bao, Xun Yi, Nguyen Hoang Tran
R2,446 Discovery Miles 24 460 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2021, held in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.

Private Information Retrieval (Paperback): Xun Yi, Russell Paulet, Elisa Bertino Private Information Retrieval (Paperback)
Xun Yi, Russell Paulet, Elisa Bertino
R775 Discovery Miles 7 750 Ships in 9 - 17 working days

This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Chain Of Thorns - The Last Hours: Book 3
Cassandra Clare Paperback R315 R286 Discovery Miles 2 860
Megalomaniacs: The Invasion Begins
Jamie Smart Paperback R295 R223 Discovery Miles 2 230
Percy Jackson And The Olympians - The…
Rick Riordan Paperback R367 Discovery Miles 3 670
Kariba
Daniel Clarke, James Clarke Paperback R399 Discovery Miles 3 990
Imogen, Obviously
Becky Albertalli Paperback R264 R242 Discovery Miles 2 420
Jakkals en Wolf 1 - 6 Lekkerlag Stories…
Wendy Maartens Paperback R230 R216 Discovery Miles 2 160
Children Of The Stone City
Beverley Naidoo Paperback R234 R214 Discovery Miles 2 140
Anderkant Die Blou
Zelda Bezuidenhout Paperback R170 R152 Discovery Miles 1 520
Check & Mate
Ali Hazelwood Paperback R313 R284 Discovery Miles 2 840
Die Woud Van Sneeu & Ys
Frenette van Wyk Paperback R280 R263 Discovery Miles 2 630

 

Partners