01038nlm--22003491i-450 99000090409040332120190610110849.00-521-00859-X000090409FED01000090409(Aleph)000090409FED0100009040920030219-2001----km-y0itay50------baengUS-------------<<A >>guide to Matlabfor beginners and experienced usersB. R. Hunt, R. L. Lipsman, J. M. Rosenbergwith K. R. Coombes, J. E. Osborn and G. J. StuckCambridgeCambridge University Press2001XVII, 327 p.23 cmMatlab519.4Hunt,Brian R.21862Lipsman,Ronald L.21863Rosenberg,Jonathan M.44013ITUNINARICAUNIMARCBK99000090409040332102 48 E 497950FINBNFINBN65-XXGuide to Matlab47414UNINA01916nam 2200481Ia 450 991069964620332120110304095843.0(CKB)5470000002404475(OCoLC)705353393(EXLCZ)99547000000240447520110304d2010 ua 0engurmn|||||||||txtrdacontentcrdamediacrrdacarrierApplication of diagnostic analysis tools to the Ares I thrust vector control system[electronic resource] /William A. Maul ... [and others] ; prepared for the Infotech@Aerospace 2010 Conference sponsored by the American Institute of Aeronautics and Astronautics, Atlanta, Georgia, April 20-22, 2010Cleveland, Ohio :National Aeronautics and Space Administration, Glenn Research Center,[2010]1 online resource (19 pages) illustrationsNASA/TM ;2010-216333Title from title screen (viewed on March 4, 2011)."June 2010.""AIAA-2010-3451."Includes bibliographical references (page 19)Ares 1 launch vehiclenasatControl systems designnasatThrust vector controlnasatFault detectionnasatInternational Space StationnasatAres 1 launch vehicle.Control systems design.Thrust vector control.Fault detection.International Space Station.Maul William A1398430NASA Glenn Research Center.Infotech@Aerospace Conference(2010 :Atlanta, Ga.)GPOGPOBOOK9910699646203321Application of diagnostic analysis tools to the Ares I thrust vector control system3505832UNINA03576nam 22005895 450 991029929520332120200706120507.0981-10-9050-510.1007/978-981-10-9050-9(CKB)4100000004244342(DE-He213)978-981-10-9050-9(MiAaPQ)EBC5398384(PPN)227400763(EXLCZ)99410000000424434220180517d2018 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierAdvanced Monitoring in P2P Botnets A Dual Perspective /by Shankar Karuppayah1st ed. 2018.Singapore :Springer Singapore :Imprint: Springer,2018.1 online resource (XVII, 105 p. 18 illus., 14 illus. in color.)SpringerBriefs on Cyber Security Systems and Networks,2522-5561981-10-9049-1 Includes bibliographical references.Chapter 1 Introduction -- Chapter 2 Background -- Chapter 3 Requirements and state of the art -- Chapter 4 The anatomy of P2P botnets -- Chapter 5 Crawling botnets -- Chapter 6 Deployment of sensor nodes in botnets.-Chapter 7 Understanding the churn dynamics in P2P botnets -- Chapter 8 Conclusion and Outlook -- Appendix -- Bibliography.This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.SpringerBriefs on Cyber Security Systems and Networks,2522-5561Computer securityComputer networksPhysicsData protectionSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Applications of Graph Theory and Complex Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/P33010Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Computer security.Computer networks.Physics.Data protection.Systems and Data Security.Computer Communication Networks.Applications of Graph Theory and Complex Networks.Security.005.8Karuppayah Shankarauthttp://id.loc.gov/vocabulary/relators/aut998003BOOK9910299295203321Advanced Monitoring in P2P Botnets2288999UNINA