Pervasive Wireless Environments: Detecting and Localizing User Spoofing:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham ; s.l.
Springer International Publishing
2014
Imprint: Springer |
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (VIII, 72 p.) Ill. |
ISBN: | 9783319073569 |
DOI: | 10.1007/978-3-319-07356-9 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV041968002 | ||
003 | DE-604 | ||
005 | 20170316 | ||
007 | cr|uuu---uuuuu | ||
008 | 140710s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319073569 |c Online |9 978-3-319-07356-9 | ||
024 | 7 | |a 10.1007/978-3-319-07356-9 |2 doi | |
035 | |a (OCoLC)882494716 | ||
035 | |a (DE-599)BVBBV041968002 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-861 |a DE-Aug4 |a DE-29 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Yang, Jie |e Verfasser |0 (DE-588)1016807082 |4 aut | |
245 | 1 | 0 | |a Pervasive Wireless Environments: Detecting and Localizing User Spoofing |c by Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng |
264 | 1 | |a Cham ; s.l. |b Springer International Publishing |c 2014 | |
264 | 1 | |b Imprint: Springer | |
300 | |a 1 Online-Ressource (VIII, 72 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science | |
533 | |a Online-Ausgabe |f Springer eBook Collection / Computer Science | ||
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 3 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 4 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chen, Yingying |d 1952- |e Sonstige |0 (DE-588)173216641 |4 oth | |
700 | 1 | |a Trappe, Wade |e Sonstige |4 oth | |
700 | 1 | |a Cheng, Jerry |e Sonstige |4 oth | |
776 | 0 | 8 | |i Reproduktion von |a Yang, Jie |t Pervasive Wireless Environments: Detecting and Localizing User Spoofing |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-07355-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-07356-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027410694&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027410694&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027410694 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07356-9 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152359673135104 |
---|---|
adam_text | PERVASIVE WIRELESS ENVIRONMENTS: DETECTING AND LOCALIZING USER SPOOFING
/ YANG, JIE
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
FEASIBILITY OF LAUNCHING USER SPOOFING
ATTACK DETECTION MODEL
DETECTION AND LOCALIZING MULTIPLE SPOOFING ATTACKERS.-DETECTING MOBILE
AGENTS USING IDENTITY FRAUD
RELATED WORK
CONCLUSIONS AND FUTURE WORK
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
PERVASIVE WIRELESS ENVIRONMENTS: DETECTING AND LOCALIZING USER SPOOFING
/ YANG, JIE
: 2014
ABSTRACT / INHALTSTEXT
THIS SPRINGER BRIEF PROVIDES A NEW APPROACH TO PREVENT USER SPOOFING BY
USING THE PHYSICAL PROPERTIES ASSOCIATED WITH WIRELESS TRANSMISSIONS TO
DETECT THE PRESENCE OF USER SPOOFING. THE MOST COMMON METHOD, APPLYING
CRYPTOGRAPHIC AUTHENTICATION, REQUIRES ADDITIONAL MANAGEMENT AND
COMPUTATIONAL POWER THAT CANNOT BE DEPLOYED CONSISTENTLY. THE AUTHORS
PRESENT THE NEW APPROACH BY OFFERING A SUMMARY OF THE RECENT RESEARCH
AND EXPLORING THE BENEFITS AND POTENTIAL CHALLENGES OF THIS METHOD. THIS
BRIEF DISCUSSES THE FEASIBILITY OF LAUNCHING USER SPOOFING ATTACKS AND
THEIR IMPACT ON THE WIRELESS AND SENSOR NETWORKS. READERS ARE EQUIPPED
TO UNDERSTAND SEVERAL SYSTEM MODELS. ONE ATTACK DETECTION MODEL EXPLOITS
THE SPATIAL CORRELATION OF RECEIVED SIGNAL STRENGTH (RSS) INHERITED FROM
WIRELESS DEVICES AS A FOUNDATION. THROUGH EXPERIMENTS IN PRACTICAL
ENVIRONMENTS, THE AUTHORS EVALUATE THE PERFORMANCE OF THE SPOOFING
ATTACK DETECTION MODEL. THE BRIEF ALSO INTRODUCES THE DEMOTE SYSTEM,
WHICH EXPLOITS THE CORRELATION WITHIN THE RSS TRACE BASED ON EACH
DEVICE’S IDENTITY TO DETECT MOBILE ATTACKERS. A FINAL CHAPTER COVERS
FUTURE DIRECTIONS OF THIS FIELD. BY PRESENTING COMPLEX TECHNICAL
INFORMATION IN A CONCISE FORMAT, THIS BRIEF IS A VALUABLE RESOURCE FOR
RESEARCHERS, PROFESSIONALS, AND ADVANCED-LEVEL STUDENTS FOCUSED ON
WIRELESS NETWORK SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Yang, Jie |
author_GND | (DE-588)1016807082 (DE-588)173216641 |
author_facet | Yang, Jie |
author_role | aut |
author_sort | Yang, Jie |
author_variant | j y jy |
building | Verbundindex |
bvnumber | BV041968002 |
classification_rvk | ST 200 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)882494716 (DE-599)BVBBV041968002 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-07356-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04037nmm a2200721 c 4500</leader><controlfield tag="001">BV041968002</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170316 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140710s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319073569</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-07356-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-07356-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)882494716</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041968002</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yang, Jie</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1016807082</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pervasive Wireless Environments: Detecting and Localizing User Spoofing</subfield><subfield code="c">by Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; s.l.</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Imprint: Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 72 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Yingying</subfield><subfield code="d">1952-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)173216641</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trappe, Wade</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cheng, Jerry</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Yang, Jie</subfield><subfield code="t">Pervasive Wireless Environments: Detecting and Localizing User Spoofing</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-07355-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027410694&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027410694&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027410694</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07356-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041968002 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:09:28Z |
institution | BVB |
isbn | 9783319073569 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027410694 |
oclc_num | 882494716 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (VIII, 72 p.) Ill. |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer International Publishing Imprint: Springer |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spelling | Yang, Jie Verfasser (DE-588)1016807082 aut Pervasive Wireless Environments: Detecting and Localizing User Spoofing by Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng Cham ; s.l. Springer International Publishing 2014 Imprint: Springer 1 Online-Ressource (VIII, 72 p.) Ill. txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in Computer Science Online-Ausgabe Springer eBook Collection / Computer Science Informatik (DE-588)4026894-9 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Ubiquitous Computing (DE-588)4657367-7 gnd rswk-swf Informatik (DE-588)4026894-9 s Ubiquitous Computing (DE-588)4657367-7 s Datenschutz (DE-588)4011134-9 s Drahtloses lokales Netz (DE-588)4633975-9 s Verteiltes System (DE-588)4238872-7 s DE-604 Chen, Yingying 1952- Sonstige (DE-588)173216641 oth Trappe, Wade Sonstige oth Cheng, Jerry Sonstige oth Reproduktion von Yang, Jie Pervasive Wireless Environments: Detecting and Localizing User Spoofing 2014 Erscheint auch als Druckausgabe 978-3-319-07355-2 https://doi.org/10.1007/978-3-319-07356-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027410694&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027410694&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Yang, Jie Pervasive Wireless Environments: Detecting and Localizing User Spoofing Informatik (DE-588)4026894-9 gnd Verteiltes System (DE-588)4238872-7 gnd Datenschutz (DE-588)4011134-9 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Ubiquitous Computing (DE-588)4657367-7 gnd |
subject_GND | (DE-588)4026894-9 (DE-588)4238872-7 (DE-588)4011134-9 (DE-588)4633975-9 (DE-588)4657367-7 |
title | Pervasive Wireless Environments: Detecting and Localizing User Spoofing |
title_auth | Pervasive Wireless Environments: Detecting and Localizing User Spoofing |
title_exact_search | Pervasive Wireless Environments: Detecting and Localizing User Spoofing |
title_full | Pervasive Wireless Environments: Detecting and Localizing User Spoofing by Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng |
title_fullStr | Pervasive Wireless Environments: Detecting and Localizing User Spoofing by Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng |
title_full_unstemmed | Pervasive Wireless Environments: Detecting and Localizing User Spoofing by Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng |
title_short | Pervasive Wireless Environments: Detecting and Localizing User Spoofing |
title_sort | pervasive wireless environments detecting and localizing user spoofing |
topic | Informatik (DE-588)4026894-9 gnd Verteiltes System (DE-588)4238872-7 gnd Datenschutz (DE-588)4011134-9 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Ubiquitous Computing (DE-588)4657367-7 gnd |
topic_facet | Informatik Verteiltes System Datenschutz Drahtloses lokales Netz Ubiquitous Computing |
url | https://doi.org/10.1007/978-3-319-07356-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027410694&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027410694&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT yangjie pervasivewirelessenvironmentsdetectingandlocalizinguserspoofing AT chenyingying pervasivewirelessenvironmentsdetectingandlocalizinguserspoofing AT trappewade pervasivewirelessenvironmentsdetectingandlocalizinguserspoofing AT chengjerry pervasivewirelessenvironmentsdetectingandlocalizinguserspoofing |