|
|
|
|
LEADER |
02409nmm a2200445 u 4500 |
001 |
EB001927331 |
003 |
EBX01000000000000001090233 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9781306410250
|
020 |
|
|
|a 9781466515673
|
020 |
|
|
|a 1466515678
|
020 |
|
|
|a 1306410258
|
050 |
|
4 |
|a TK5102.85
|
100 |
1 |
|
|a Chaki, Nabendu
|e editor
|
245 |
0 |
0 |
|a Intrusion detection in wireless ad-hoc networks
|c edited by Nabendu Chaki, Rituparna Chaki
|
260 |
|
|
|a Boca Raton, FL
|b CRC Press
|c 2014
|
300 |
|
|
|a xiii, 244 pages
|
505 |
0 |
|
|a Introduction -- Architecture and Organization Issues -- Routing for Ad-Hoc Networks -- Different Types of Attacks for WANs -- Honesty and Trust-Based IDS Solutions -- Blackhole Attack Detection Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN Security
|
505 |
0 |
|
|a Includes bibliographical references and index
|
653 |
|
|
|a COMPUTERS / Internet / Security / bisacsh
|
653 |
|
|
|a COMPUTERS / Networking / Security / bisacsh
|
653 |
|
|
|a Transmission sans fil / Sécurité / Mesures
|
653 |
|
|
|a Wireless communication systems / Security measures / fast
|
653 |
|
|
|a Wireless communication systems / Security measures
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
700 |
1 |
|
|a Chaki, Rituparna
|e editor
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
015 |
|
|
|a GBB799773
|
776 |
|
|
|z 9781306410250
|
776 |
|
|
|z 9781466515659
|
776 |
|
|
|z 1306410258
|
776 |
|
|
|z 1466515651
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781466515673/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems
|