Vi bøger
Levering: 1 - 2 hverdage

Bøger af Xun Yi

Filter
Filter
Sorter efterSorter Populære
  • af Xun Yi
    454,95 kr.

    This monograph provides a comprehensive and rigorous exposition of the basic concepts and most important modern research results concerning blockchain and its applications. The book includes the required cryptographic fundamentals underpinning the blockchain technology, since understanding of the concepts of cryptography involved in the design of blockchain is necessary for mastering the security guarantees furnished by blockchain. It also contains an introduction to cryptographic primitives, and separate chapters on bitcoin, ethereum and smart contracts, public blockchain, private blockchain, cryptocurrencies, and blockchain applications.This volume is of great interest to active researchers who are keen to develop novel applications of blockchain in the field of their investigatio. Further, it is also beneficial for  industry practitioners as well as undergraduate students in computing and information technology.

  • af Xun Yi
    302,95 kr.

    This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.

  • - Machine Learning Concepts for Intrusion Detection and Prevention
    af Xun Yi, Abdulmohsen Almalawi, Adil Fahad & mfl.
    1.187,95 kr.

    Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systemsCyber-attacks on SCADA systems-the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management-can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning.Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book:* Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems* Describes the relationship between main components and three generations of SCADA systems* Explains the classification of a SCADA IDS based on its architecture and implementation* Surveys the current literature in the field and suggests possible directions for future researchSCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.

  • af Xun Yi, Russell Paulet & Elisa Bertino
    627,95 kr.

    From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. This volume achieves a balance between the theoretical and the practical components of modern information security.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.