Secure computer and network systems : modeling, analysis and design / Nong Ye.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | TK5105.59 .Y44 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000094128 | |
![]() |
Main Library | TK5105.59 .Y44 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000121190 |
Includes bibliographical references and index.
Assets, vulnerabilities and threats of computer and network systems -- Protection of computer and network systems -- Asset protection-driven, policy-based security protection architecture -- Job admission control for service stability -- Job scheduling methods for service differentiation and service stability -- Job reservation and service protocols for end-to-end delay guarantee -- Collection of Windows performance objects data under attack and normal use conditions -- Mean shift characteristics of attack and normal use data -- Probability distribution change characteristics of attack and normal use data -- Autocorrelation change characteristics of attack and normal use data -- Wavelet change characteristics of attack and normal use data -- Clustering and classifying attack and normal use data -- Learning and recognizing attack signatures using artificial neural networks -- Statistical anomaly detection with univariate and multivariate data -- Stochastic anomaly detection using the Markov chain model of event transitions -- Mathematical and statistical models of attack data and normal use data -- Cuscore-based attack norm separation models -- Optimal selection and correlation of attack data characteristics in attack profiles.
1 2
There are no comments on this title.