SFr. 65.00
€ 70.20
BTC 0.0012
LTC 0.991
ETH 0.0252


bestellen

Artikel-Nr. 16573048


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:


Herausgeber: 
  • Roger Piqueras Jover
  • Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 2 Artikel!


    Übersicht

    Auf mobile öffnen
     
    Lieferstatus:   i.d.R. innert 7-14 Tagen versandfertig
    Veröffentlichung:  April 2014  
    Genre:  Naturwissensch., Medizin, Technik 
    ISBN:  9788793237056 
    EAN-Code: 
    9788793237056 
    Verlag:  River Publishers 
    Einband:  Kartoniert  
    Sprache:  English  
    Dimensionen:  H 234 mm / B 156 mm / D 8 mm 
    Gewicht:  237 gr 
    Seiten:  148 
    Zus. Info:  Paperback 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice and short messaging traffic for billions of users. This new cellular communication system is the natural evolution of 3rd Generation Partnership Project (3GPP)-based access networks, enhancing the Universal Mobile Telecommunications System (UMTS). LTE introduces a substantial redesign of the network architecture resulting in the new eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and the EPC (Enhanced Packet Core). In this context, the LTE Radio Access Network (RAN) is built upon a redesigned physical layer and based on an Orthogonal Frequency Division Multiple Access (OFDMA) modulation, which features robust performance in challenging multipath environments and substantially improves spectrum efficiency and capacity. Moreover, the new all-IP core architecture is designed to be more flexible and flatter, with a logical separation of the traffic related functions and the control and signaling functions. Over the last few years, researchers have published and presented potential vulnerabilities and attacks against the second generation of mobile networks, the Global System for Mobile Communications (GSM). Although technology, encryption schemes and security in general have drastically improved in LTE with respect of legacy GSM networks, security research should continue proactively working towards secure and resilient mobile communication systems. In this context, the cyber-security landscape has changed drastically over the last few years. It is now characterized by large scale security threats and the advent of sophisticated intrusions. These new threats illustrate the importance of strengthening the resiliency of mobility networks against security attacks, ensuring this way full mobility network availability. This special issue of the Journal of Cyber Security and Mobility addresses research advances in mobility security for LTE next generation mobility networks and other wireless communication systems. Two of the papers in this special issue analyze the threat of radio jamming. Lichtman et al. introduce a sophisticated reinforcement learning anti-jamming technique aimed at protecting frequency hopping wireless systems from jamming attacks while maximizing link throughput. Similarly, Kornemann et al. introduce a jamming detection mechanism for Wireless Sensor Networks (WSN), which are known to be substantially vulnerable to this type of attack. Focusing specifically on LTE mobile networks, Jermyn et al. perform a thorough simulation analysis of potential Denial of Service attacks against the eUTRAN by means of a botnet of malware-infected mobile terminals saturating the radio interface with large amounts of traffic. This type of malware infections and the connections of such a botnet to the malicious command and control servers could be detected with the system introduced by Bickford et al. This advanced detection scheme is capable to detect malicious activity in mobile terminals and proceed to mitigate and block the malicious applications. Finally, Alzahrani et al. present a very detailed and thorough analysis of the security research published over the last few years on mobile malware analysis, detection and mitigation. The valuable insights in this paper set a common ground and framework to facilitate research in this area, as well as to share results and easily replicate experiments.

      
     Empfehlungen... 
     Journal of Cyber Security and Mobility 2-2 - (Buch)
     Journal of Cyber Security and Mobility 3-1, Specia - (Buch)
     Journal of Cyber Security and Mobility 3-3, Specia - (Buch)
     Journal of Cyber Security and Mobility 1-2/3 - (Buch)
     Journal of Cyber Security and Mobility (6-3) - (Buch)
     Journal of Cyber Security and Mobility (6-1) - (Buch)
     Journal of Cyber Security and Mobility 3-4 - (Buch)
     JOURNAL OF CYBER SECURITY AND MOBILITY 4-4 - (Buch)
     Journal of Cyber Security and Mobility (5-4) - (Buch)
     JOURNAL OF CYBER SECURITY AND MOBILITY 4-1: Resili - (Buch)
     Weitersuchen in   DVD/FILME   CDS   GAMES   BÜCHERN   



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Datenschutzerklärung | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2024
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2024