Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor N ...
This book constitutes the refereed proceedings of the 4th International Workshop on Distributed Computing, IWDC 2002, held in Calcutta, India, in December 2002. The 31 revised full papers and 3 student papers presented together with 3 keynote papers were carefully reviewed and selected from more than 90 submissions. The papers are organized in topical sections on Web caching, distributed computing, wireless networks, wireless mobile systems, VLSI and parallel systems, optical networks, and distributed systems.
Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary nature of the design of smart environments, the topics covered include the latest research in smart environment philosophical and computational architecture considerations, network protocols for smart environments, intelligent sensor networks and powerline control of devices, and action prediction and identification.
This volume examines nationhood as a concept and how it became the basis of political discourse in South Asia. It studies the emergence of nationalism in modern states as a powerful, omnipotent, and omnipresent form of political identity in the nineteenth and twentieth centuries. This book examines the idea of a nation, as it originated in medieval Europe, as an unending process of 'othering' individuals, groups, and communities to establish its hegemony, exclusivity, and absolute power within a political discourse. It sheds light on how these new political frameworks in the name of nationalism resulted in conflicts and bloodshed. It unleashed politics of retribution and facilitated majoritarianism, minority persecution, and collective authoritarianism which devastated individuals and collectivities. Further, the author also discusses various prominent ideas and contemporary theories on nationalism alongside pivotal socio-cultural factors which have significantly shaped the formation of modern nation states and their politics. Topical and nuanced, this book will be indispensable to researchers, scholars, and readers interested in nationalism, political science, modern history, political theory, political philosophy, political sociology, political history, post-colonial studies, and South Asia studies.
The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.
Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor N ...
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.