Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
SpringerBriefs in Computer Science

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications

Zhou Lu y otros
    • USD 39.99
    • USD 39.99

Descripción editorial

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications.
The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications.
This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

GÉNERO
Informática e Internet
PUBLICADO
2015
5 de noviembre
IDIOMA
EN
Inglés
EXTENSIÓN
129
Páginas
EDITORIAL
Springer International Publishing
VENDEDOR
Springer Nature B.V.
TAMAÑO
2.9
MB
Introduction to Ethical Software Development Introduction to Ethical Software Development
2025
Digital Image Forgery Detection Digital Image Forgery Detection
2025
Blockchain Without Barriers Blockchain Without Barriers
2025
Human Reconstruction Using mmWave Technology Human Reconstruction Using mmWave Technology
2025
Intelligent Localization for Integrated Sensing and Communication Intelligent Localization for Integrated Sensing and Communication
2025
Secure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems Secure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems
2025