00784nam 2200253la 450 991048157720332120210618142947.0(UK-CbPIL)2090320432(CKB)5500000000106743(EXLCZ)99550000000010674320210618f14981500 uy |laturcn||||a|bb|Erotemata[electronic resource]Florence Benedetto Riccardini, fl. 1498-1500[1498-1500?]Online resource (v.)Reproduction of original in Biblioteca Nazionale Centrale di Firenze.Chrysoloras Manuelapproximately 1350-1415.329326Uk-CbPILUk-CbPILBOOK9910481577203321Erotemata2241812UNINA02886nam 2200505 450 99646534360331620210211110054.0981-15-6575-910.1007/978-981-15-6575-5(CKB)4100000011457715(DE-He213)978-981-15-6575-5(MiAaPQ)EBC6350773(PPN)250219549(EXLCZ)99410000001145771520210211d2020 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAccountability and privacy in network security /Yuxiang Ma, Yulei Wu, Jingguo Ge1st ed. 2020.Cham, Switzerland :Springer,[2020]©20201 online resource (XII, 140 p. 62 illus., 59 illus. in color.) 981-15-6574-0 Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.Computer networksSecurity measuresComputer networksComputer securityComputer networksSecurity measures.Computer networks.Computer security.005.8Ma Yuxiang971608Wu YuleiGe JingguoMiAaPQMiAaPQMiAaPQBOOK996465343603316Accountability and privacy in network security2208963UNISA01334nam a2200301 i 4500991002526499707536040314s2004 it a 100 0 ita 8838726566b12935797-39ule_instSet. Economiaita34312Convegno nazionale sul commercio<2. ;2003 ;Firenze>486810Commercio e valorizzazione del territorio :centri storici, pubblici esercizi, strutture ricettive : atti del 2. Convegno nazionale sul commercio, Firenze, 11-13 dicembre 2003Santarcangelo di Romagna (Rimini) :Maggioli,2004410 p. :ill. ;24 cmINDIS ;4In testa al front.: INDIS, Istituto nazionale distribuzione e serviziContiene riferimenti bibliograficiEsercizi pubbliciLegislazioneCongressi2003Centri storiciTutelaCongressi2003CommercioItaliaCongressi2003INDIS.b1293579707-11-1422-04-04991002526499707536LE025 ECO 343 IND01.0112025000099333le025pE32.00-l- 0102100.i1353512231-05-04Commercio e valorizzazione del territorio281920UNISALENTOle02522-04-04ma -itait 01