The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems. In addition, detailed discussions of the underlying fundamental analytical tools and engineering methodologies of these adversary detection techniques are provided, considering that many of them are quite general and have been widely employed in many other related fields. The exposition of this book starts from a brief introduction of the CR technology and spectrum sensing in Chapter 1. This is followed by an overview of the relevant security vulnerabilities and a detailed discussion of two security threats unique to CR networks, namely, the primary user emulation (PUE) attack and the Byzantine attack. To better prepare the reader for the discussions in later chapters, preliminaries of analytic tools related to adversary detection are introduced in Chapter 2. In Chapter 3, a suite of cutting-edge adversary detection techniques tailor-designed against the PUE and the Byzantine attacks are reviewed to provide a clear overview of existing research in this field. More detailed case studies are presented in Chapters 4 – 6. Specifically, a physical-layer based PUE attack detection scheme is presented in Chapter 4, while Chapters 5 and 6 are devoted to the illustration of two novel detection techniques against the Byzantine attack. Concluding remarks and outlooks for future research are provided in Chapter 7. The primary audience for this SpringerBrief include network engineers interested in addressing adversary detection issues in cognitive radio networks, researchers interested in the state-of-the-art on unique security threats to cognitive radio networks and the corresponding detection mechanisms. Also, graduate and undergraduate students interested in obtaining comprehensive information on adversary detection in cognitive radio networks and applying the underlying techniques to address relevant research problems can use this SpringerBrief as a study guide.
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems. In addition, detailed discussions of the underlying fundamental analytical tools and engineering methodologies of these adversary detection techniques are provided, considering that many of them are quite general and have been widely employed in many other related fields. The exposition of this book starts from a brief introduction of the CR technology and spectrum sensing in Chapter 1. This is followed by an overview of the relevant security vulnerabilities and a detailed discussion of two security threats unique to CR networks, namely, the primary user emulation (PUE) attack and the Byzantine attack. To better prepare the reader for the discussions in later chapters, preliminaries of analytic tools related to adversary detection are introduced in Chapter 2. In Chapter 3, a suite of cutting-edge adversary detection techniques tailor-designed against the PUE and the Byzantine attacks are reviewed to provide a clear overview of existing research in this field. More detailed case studies are presented in Chapters 4 – 6. Specifically, a physical-layer based PUE attack detection scheme is presented in Chapter 4, while Chapters 5 and 6 are devoted to the illustration of two novel detection techniques against the Byzantine attack. Concluding remarks and outlooks for future research are provided in Chapter 7. The primary audience for this SpringerBrief include network engineers interested in addressing adversary detection issues in cognitive radio networks, researchers interested in the state-of-the-art on unique security threats to cognitive radio networks and the corresponding detection mechanisms. Also, graduate and undergraduate students interested in obtaining comprehensive information on adversary detection in cognitive radio networks and applying the underlying techniques to address relevant research problems can use this SpringerBrief as a study guide.
Animals play crucial roles in Buddhist thought and practice. However, many symbolically or culturally significant animals found in India, where Buddhism originated, do not inhabit China, to which Buddhism spread in the medieval period. In order to adapt Buddhist ideas and imagery to the Chinese context, writers reinterpreted and modified the meanings different creatures possessed. Medieval sources tell stories of monks taming wild tigers, detail rituals for killing snakes, and even address the question of whether a parrot could achieve enlightenment. Huaiyu Chen examines how Buddhist ideas about animals changed and were changed by medieval Chinese culture. He explores the entangled relations among animals, religions, the state, and local communities, considering both the multivalent meanings associated with animals and the daily experience of living with the natural world. Chen illustrates how Buddhism influenced Chinese knowledge and experience of animals as well as how Chinese state ideology, Daoism, and local cultic practices reshaped Buddhism. He shows how Buddhism, Confucianism, and Daoism developed doctrines, rituals, discourses, and practices to manage power relations between animals and humans. Drawing on a wide range of sources, including traditional texts, stone inscriptions, manuscripts, and visual culture, this interdisciplinary book bridges history, religious studies, animal studies, and environmental studies. In examining how Buddhist depictions of the natural world and Chinese taxonomies of animals mutually enriched each other, In the Land of Tigers and Snakes offers a new perspective on how Buddhism took root in Chinese society.
FROM LED TO SOLID STATE LIGHTING A comprehensive and practical reference complete with hands-on exercises and experimental data In From LED to Solid State Lighting: Principles, Materials, Packaging, Characterization, and Applications, accomplished mechanical engineers Shi-Wei Ricky Lee, Jeffery C. C. Lo, Mian Tao, and Huaiyu Ye deliver a practical overview of the design and construction of LED lighting modules, from the fabrication of the LED chip to the LED modules incorporated in complete LED lighting fixtures. The distinguished authors discuss the major advantages of solid-state lighting, including energy savings, environmental friendliness, and lengthy operational life, as well as the contributions offered by the packaging of light-emitting diodes in the pursuit of these features. Readers will discover presentations of the technical issues that arise in packaging LED components, like interconnection, phosphor deposition, and encapsulation. They’ll also find insightful elaborations on optical design, analysis, and characterization. Discussions of LED applications, technology roadmaps, and IP issues round out the included material. This important book also includes: Thorough introductions to lighting, photometry, and colorimetry, the fundamentals of light-emitting diodes, and the fabrication of LED wafers and chips Practical discussions of the packaging of LED chips, wafer-level packaging of LED arrays, and optical and electrical characterization Comprehensive explorations of board-level assembly and LED modules and optical and electrical characterization In-depth examinations of thermal management, reliability engineering for LED packaging, and applications for general lighting Perfect for post-graduate students and practicing engineers studying or working in the field of LED manufacturing for solid state lighting applications, From LED to Solid State Lighting: Principles, Materials, Packaging, Characterization, and Applications is also an indispensable resource for managers and technicians seeking a one-stop guide to the subject.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.