LEADER 02600nam 2200433 a 450 001 9910795854203321 005 20200520144314.0 010 $a0-19-155295-X 010 $a0-19-177502-9 010 $a1-299-48624-X 035 $a(CKB)24235086200041 035 $a(MiAaPQ)EBC1179556 035 $a(MiAaPQ)EBC7038518 035 $a(Au-PeEL)EBL1179556 035 $a(CaPaEBR)ebr10691670 035 $a(CaONFJC)MIL479874 035 $a(OCoLC)843200350 035 $a(EXLCZ)9924235086200041 100 $a20110602d2011 uy 0 101 0 $aeng 135 $aur||||||||||| 200 10$aFirst steps in random walks$b[electronic resource] $efrom tools to applications /$fJ. Klafter and I.M. Sokolov 210 $aOxford $cOxford University Press$d2011 215 $avi, 152 p. $cill 320 $aIncludes bibliographical references and index. 327 $a1. Characteristic functions -- 2. Generating functions and applications -- 3. Continuous-time random walks -- 4. CTRW and aging phenomena -- 5. Master equations -- 6. Fractional diffusion and Fokker-Planck equations for subdiffusion -- 7. Levy flights -- 8. Coupled CTRW and Levy walks -- 9. Simple reactions : A+B->B -- 10. Random walks on percolation structures. 330 $a"The name "random walk" for a problem of a displacement of a point in a sequence of independent random steps was coined by Karl Pearson in 1905 in a question posed to readers of "Nature". The same year, a similar problem was formulated by Albert Einstein in one of his Annus Mirabilis works. Even earlier such a problem was posed by Louis Bachelier in his thesis devoted to the theory of financial speculations in 1900. Nowadays the theory of random walks has proved useful in physics and chemistry (diffusion, reactions, mixing in flows), economics, biology (from animal spread to motion of subcellular structures) and in many other disciplines. The random walk approach serves not only as a model of simple diffusion but of many complex sub- and super-diffusive transport processes as well. This book discusses the main variants of random walks and gives the most important mathematical tools for their theoretical description"--$cProvided by publisher. 606 $aRandom walks (Mathematics) 615 0$aRandom walks (Mathematics) 676 $a519.2/82 700 $aKlafter$b J$g(Joseph)$01519557 701 $aSokolov$b Igor M.$f1958-$01519558 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910795854203321 996 $aFirst steps in random walks$93757750 997 $aUNINA LEADER 06001nam 22008535 450 001 9910143615203321 005 20250630171927.0 010 $a3-540-45474-8 024 7 $a10.1007/3-540-45474-8 035 $a(CKB)1000000000211609 035 $a(SSID)ssj0000326131 035 $a(PQKBManifestationID)11255377 035 $a(PQKBTitleCode)TC0000326131 035 $a(PQKBWorkID)10266818 035 $a(PQKB)10140106 035 $a(DE-He213)978-3-540-45474-8 035 $a(MiAaPQ)EBC3071904 035 $a(PPN)155224131 035 $a(EXLCZ)991000000000211609 100 $a20121227d2001 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRecent Advances in Intrusion Detection $e4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001 Proceedings /$fedited by Wenke Lee, Ludovic Me, Andreas Wespi 205 $a1st ed. 2001. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2001. 215 $a1 online resource (X, 210 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2212 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-42702-3 320 $aIncludes bibliographical references and index. 327 $aModeling Attacks -- From Declarative Signatures to Misuse IDS -- Logging and IDS Integration -- Application-Integrated Data Collection for Security Monitoring -- Interfacing Trusted Applications with Intrusion Detection Systems -- IDS Cooperation -- Probabilistic Alert Correlation -- Designing a Web of Highly-Configurable Intrusion Detection Sensors -- Aggregation and Correlation of Intrusion-Detection Alerts -- Anomaly Detection -- Accurately Detecting Source Code of Attacks That Increase Privilege -- CDIS: Towards a Computer Immune System for Detecting Network Intrusions -- Intrusion Tolerance -- Autonomic Response to Distributed Denial of Service Attacks -- Legal Aspects -- The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information -- Specification-Based IDS -- Experiences with Specification-Based Intrusion Detection -- System Health and Intrusion Monitoring Using a Hierarchy of Constraints. 330 $aOn behalf of the program committee, it is our pleasure to present to you the proceedings of the fourth Recent Advances in Intrusion Detection Symposium. The RAID 2001program committee received 55 paper submissions from 13 countries. All submissions were carefully reviewed by several members of the program committee on the criteria of scientific novelty, importance to the field, and technical quality. Final selection took place at a meeting held on May 16-17 in Oakland, California. Twelve papers were selected for presentation and publication in the conference proceedings. In addition, nine papers, presenting work in progress, were selected for presentation. The program included both fundamental research and practical issues: imaging and IDS integration, attack modeling, anomaly detection, specification- based IDS, IDS assessment, IDS cooperation, intrusion tolerance, and legal aspects. RAID 2001also hosted two panels, one on ?The Present and Future of IDS Testing Methodologies,? a subject of major concern for all IDS users and designers, and one on ?Intrusion Tolerance,? an emerging research area of increasing importance. Dr. Bill Hancock, Senior Vice President and Chief Security Officer of Exodus Communications, Inc., delivered a keynote speech ?Real world intrusion detection or how not to become a deer in the headlights of an attacker?s car on the information superhighway?. The slides presented by the authors, the 9 papers which are not in the proceedings, and the slides presented by the panelists are available on the website of the RAID symposium series, http://www.raid-symposium.org/. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2212 606 $aManagement information systems 606 $aComputer science 606 $aComputer engineering 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I27000 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer engineering. 615 0$aData encryption (Computer science) 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 14$aManagement of Computing and Information Systems. 615 24$aComputer Engineering. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 676 $a005.8 702 $aLee$b Wenke$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMe$b Ludovic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWespi$b Andreas$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aRAID 2001 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143615203321 996 $aRecent Advances in Intrusion Detection$9772673 997 $aUNINA