Group Testing Theory in Network Security
24%
off

Group Testing Theory in Network Security : An Advanced Solution

By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 4 business days
When will my order arrive?

Description

Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.
show more

Product details

  • Paperback | 86 pages
  • 155 x 235 x 10.16mm | 166g
  • New York, NY, United States
  • English
  • 2012
  • 14 Tables, black and white; 17 Illustrations, color; 7 Illustrations, black and white; XI, 86 p. 24 illus., 17 illus. in color.
  • 1461401275
  • 9781461401278
  • 2,694,793

Table of contents

-1. Group Testing (Introduction, Basic Theory and Design, Applications in Network Security). -2.Size Constraint Group Testing and DoS Attacks (Overview, Network System Models, Size Constraint Group Testing, Matrix Construction and Latency Analyses, Detection System Configuration, Experimental Analysis). -3. Interference Free Group Testing and Reactive Jamming Attacks (Overview, Problem Models and Preliminaries, Group Testing based Trigger Node Identification-Preprocessing, Identifying Trigger Nodes(ITN) Algorithm, Theoretical Analysis, Experimental Analysis). -4. Randomized Fault Tolerant Group Testing and Advanced Security (Advanced Attacker Model, Error-tolerant Randomized Non-Adaptive Group Testing, Clique-Independent Set, Advanced Trigger Node Identification, Advanced Solutions Toward Sophisticated Attack Models, Experimental Analysis). -5. Outlooks (General Detection Framework based on Group Testing, Size Constraint Group Testing, Jamming Attacks and Trigger Node Detection).-References. - Index.
show more

Review Text

From the reviews:

"The topic of this monograph is at the crossroads of optimization, network security, graph theory, and algorithmic complexity. ... The monograph is written in a compact and precise style. ... Given the network architecture of modern communications, the topic is certainly timely. In sum, this monograph provides advanced solutions based on group testing to some particular threats to network security. Therefore, it is going to be very useful for researchers seeking a brief introduction to the state-of-art of this new and specialized methodology." (José M. Amigó, Mathematical Reviews, January, 2013)
show more

Review quote

From the reviews:

"The topic of this monograph is at the crossroads of optimization, network security, graph theory, and algorithmic complexity. ... The monograph is written in a compact and precise style. ... Given the network architecture of modern communications, the topic is certainly timely. In sum, this monograph provides advanced solutions based on group testing to some particular threats to network security. Therefore, it is going to be very useful for researchers seeking a brief introduction to the state-of-art of this new and specialized methodology." (Jose M. Amigo, Mathematical Reviews, January, 2013)
show more