LEADER 04120nam 22006855 450 001 9910299205303321 005 20200705052430.0 010 $a3-319-23288-6 024 7 $a10.1007/978-3-319-23288-1 035 $a(CKB)3710000000501054 035 $a(EBL)4084465 035 $a(SSID)ssj0001584290 035 $a(PQKBManifestationID)16263664 035 $a(PQKBTitleCode)TC0001584290 035 $a(PQKBWorkID)14866018 035 $a(PQKB)10805785 035 $a(DE-He213)978-3-319-23288-1 035 $a(MiAaPQ)EBC4084465 035 $a(PPN)190522860 035 $a(EXLCZ)993710000000501054 100 $a20151105d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aModeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications /$fby Zhou Lu, Wenye Wang, Cliff Wang 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (128 p.) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $aDescription based upon print version of record. 311 $a3-319-23287-8 320 $aIncludes bibliographical references at the end of each chapters. 327 $aModeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks -- Modeling the Impact of Jamming Attacks on Time-Critical Traffic with Applications to Smart Grid -- Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications under Jamming -- Understanding the Resilience of Mobile Cloud Services to Malware. 330 $aThis SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security. 410 0$aSpringerBriefs in Computer Science,$x2191-5768 606 $aComputer security 606 $aComputer communication systems 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 700 $aLu$b Zhou$4aut$4http://id.loc.gov/vocabulary/relators/aut$01060413 702 $aWang$b Wenye$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWang$b Cliff$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299205303321 996 $aModeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications$92513485 997 $aUNINA