000 -LEADER |
fixed length control field |
02512nam a22004575i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151446.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
111013s2012 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781461401285 |
|
978-1-4614-0128-5 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA402.5-402.6 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
519.6 |
Edition number |
23 |
264 #1 - |
-- |
New York, NY : |
-- |
Springer New York, |
-- |
2012. |
912 ## - |
-- |
ZDB-2-SMA |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Thai, My T. |
Relator term |
author. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Group Testing Theory in Network Security |
Medium |
[electronic resource] : |
Remainder of title |
An Advanced Solution / |
Statement of responsibility, etc |
by My T. Thai. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XI, 86p. 24 illus., 17 illus. in color. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
SpringerBriefs in Optimization, |
International Standard Serial Number |
2190-8354 |
520 ## - SUMMARY, ETC. |
Summary, etc |
Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Mathematics. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Mathematical optimization. |
|
Topical term or geographic name as entry element |
Engineering mathematics. |
|
Topical term or geographic name as entry element |
Industrial engineering. |
|
Topical term or geographic name as entry element |
Mathematics. |
|
Topical term or geographic name as entry element |
Optimization. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Industrial and Production Engineering. |
|
Topical term or geographic name as entry element |
Appl.Mathematics/Computational Methods of Engineering. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781461401278 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-1-4614-0128-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |