Secure computer and network systems : modeling, analysis and design / Nong Ye.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | TK5105.59 .Y44 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000094128 | |
![]() |
Main Library | TK5105.59 .Y44 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000121190 |
Browsing Main Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
TK5105.59 .W43 2003 Web services security / | TK5105.59 .W43 2009 Guide to strategic infrastructure security : becoming a security network professional / | TK5105.59 .W54 2016 Principles of information security / | TK5105.59 .Y44 2008 Secure computer and network systems : modeling, analysis and design / | TK5105.5956 .C753 2017 High-performance IT services / | TK5105.597 C37 2009 Citrix XenApp platinum edition for Windows : the official guide / | TK5105.597 C37 2009 Citrix XenApp platinum edition for Windows : the official guide / |
Includes bibliographical references and index.
Assets, vulnerabilities and threats of computer and network systems -- Protection of computer and network systems -- Asset protection-driven, policy-based security protection architecture -- Job admission control for service stability -- Job scheduling methods for service differentiation and service stability -- Job reservation and service protocols for end-to-end delay guarantee -- Collection of Windows performance objects data under attack and normal use conditions -- Mean shift characteristics of attack and normal use data -- Probability distribution change characteristics of attack and normal use data -- Autocorrelation change characteristics of attack and normal use data -- Wavelet change characteristics of attack and normal use data -- Clustering and classifying attack and normal use data -- Learning and recognizing attack signatures using artificial neural networks -- Statistical anomaly detection with univariate and multivariate data -- Stochastic anomaly detection using the Markov chain model of event transitions -- Mathematical and statistical models of attack data and normal use data -- Cuscore-based attack norm separation models -- Optimal selection and correlation of attack data characteristics in attack profiles.
1 2
There are no comments on this title.