02886nam 2200505 450 99646534360331620210211110054.0981-15-6575-910.1007/978-981-15-6575-5(CKB)4100000011457715(DE-He213)978-981-15-6575-5(MiAaPQ)EBC6350773(PPN)250219549(EXLCZ)99410000001145771520210211d2020 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAccountability and privacy in network security /Yuxiang Ma, Yulei Wu, Jingguo Ge1st ed. 2020.Cham, Switzerland :Springer,[2020]©20201 online resource (XII, 140 p. 62 illus., 59 illus. in color.) 981-15-6574-0 Introduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.Computer networksSecurity measuresComputer networksComputer securityComputer networksSecurity measures.Computer networks.Computer security.005.8Ma Yuxiang971608Wu YuleiGe JingguoMiAaPQMiAaPQMiAaPQBOOK996465343603316Accountability and privacy in network security2208963UNISA01094nam0 22002771i 450 UON0013013920231205102752.95320020107g19601339 |0itac50 baperIR|||| 1||||Tarix-e meqyasat va noqud dar hokumat-e EslamiS.M. 'Ali Sustari EmamTehranDanessara-ye 'Ali1339 H. [1960]1 v.24 cmSCIENZEUONC017422FIIRTihrānUONL005570IRA XVIII GIRAN - SCIENZE PURE E APPLICATE - ALTRE SCIENZEAEMAMSayyed M. 'Ali SustariUONV072090666571Danessara-ye 'AliUONV262719650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00130139SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI IRA XVIII G 009 SI MR 79885 5 009 SCIENZASCIENZEUONC005734Tarix-e meqyasat va noqud dar hokumat-e Eslami1318900UNIOR