The goal of this SpringerBrief is to collect and systematically present thestate-of-the-art in this research field and the underlying game-theoreticand learning tools to the broader audience with general network secur...
ISBN:
(数字)9783319758718
ISBN:
(纸本)9783319758701
The goal of this SpringerBrief is to collect and systematically present thestate-of-the-art in this research field and the underlying game-theoreticand learning tools to the broader audience with general network securityand engineering backgrounds. Particularly, the exposition of this book beginswith a brief introduction of relevant background knowledge in Chapter 1,followed by a review of existing applications of SG in addressing variousdynamic network security problems in Chapter 2. A detailed treatment of dynamic security gameswith information asymmetry is given in Chapters 35. Specifically, dynamicsecurity games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary arediscussed in Chapter 3. The complementary scenarios where the defenderlacks information about the adversary is examined in Chapter 4 throughthe lens of incomplete information SG. Chapter 5 is devoted to theexploration of how to proactively create information asymmetry for thedefenders benefit. The primary audience for this brief includesnetwork engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic gametheory and its applications in network security will be interested in this SpringerBrief as well. Also graduate andundergraduate students interested in obtaining comprehensiveinformation on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective forfuture works are presented in Chapter 6.
This book presents and develops several important concepts of speech enhancement in a simple but rigorous way. Many of the ideas are new; not only do they shed light on this old problem but they also offer valuable ti...
ISBN:
(数字)9783319745244
ISBN:
(纸本)9783319745237
This book presents and develops several important concepts of speech enhancement in a simple but rigorous way. Many of the ideas are new; not only do they shed light on this old problem but they also offer valuable tips on how to improve on some well-known conventional approaches. The book unifies all aspects of speech enhancement, from single channel, multichannel, beamforming, time domain, frequency domain and timefrequency domain, to binaural in a clear and flexible framework. It starts with an exhaustive discussion on the fundamental best (linear and nonlinear) estimators, showing how they are connected to various important measures such as the coefficient of determination, the correlation coefficient, the conditional correlation coefficient, and the signal-to-noise ratio (SNR). It then goes on to show how to exploit these measures in order to derive all kinds of noise reduction algorithms that can offer an accurate and versatile compromise between noise reduction and speech distortion.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapt...
ISBN:
(数字)9783030021139
ISBN:
(纸本)9783030021122
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation.
The book is focused on measurement automation, specifically using the LabView tool. It explains basic measurements in a simplified manner with appropriate step-by-step explanations and discussions of instrument capabi...
详细信息
ISBN:
(数字)9789811062803
ISBN:
(纸本)9789811062797
The book is focused on measurement automation, specifically using the LabView tool. It explains basic measurements in a simplified manner with appropriate step-by-step explanations and discussions of instrument capabilities. It touches upon aspects of measurement science, microwave measurements and software development for measurement. The book can be used as a guide by technicians, researchers and scientists involved in metrology laboratories to automate measurements. The book explains the development process for automation of measurement systems for every step of the software development lifecycle. It covers system design and automation policy creation. The book uses a top-down approach which enables the reader to relate their own problems and develop a system with their own analysis. The book includes many examples, illustrations, flowcharts, measurement results and screenshots of a worked-out automation software for microwave measurement. The book includes discussions on microwave measurements-attenuation, microwave power and E-field strength. The contents of this book will be of interest to students, researchers and scientists working in the field of electromagnetism, antennas, communication and electromagnetic interference/electromagnetic compatibility (EMI/EMC).
This SpringerBrief begins by introducing the concept of smartphone sensing and summarizing the main tasks of applying smartphone sensing in vehicles. Chapter 2 describes the vehicle dynamics sensing model that exploit...
ISBN:
(数字)9783319897707
ISBN:
(纸本)9783319897691
This SpringerBrief begins by introducing the concept of smartphone sensing and summarizing the main tasks of applying smartphone sensing in vehicles. Chapter 2 describes the vehicle dynamics sensing model that exploits the raw data of motion sensors (i.e., accelerometer and gyroscope) to give the dynamic of vehicles, including stopping, turning, changing lanes, driving on uneven road, etc. Chapter 3 detects the abnormal driving behaviors based on sensing vehicle dynamics. Specifically, this brief proposes a machine learning-based fine-grained abnormal driving behavior detection and identification system, D3, to perform real-time high-accurate abnormal driving behaviors monitoring using the built-in motion sensors in smartphones. As more vehicles taking part in the transportation system in recent years, driving or taking vehicles have become an inseparable part of our daily life. However, increasing vehicles on the roads bring more traffic issues including crashes and congestions, which make it necessary to sense vehicle dynamics and detect driving behaviors for drivers. For example, sensing lane information of vehicles in real time can be assisted with the navigators to avoid unnecessary detours, and acquiring instant vehicle speed is desirable to many important vehicular applications. Moreover, if the driving behaviors of drivers, like inattentive and drunk driver, can be detected and warned in time, a large part of traffic accidents can be prevented. However, for sensing vehicle dynamics and detecting driving behaviors, traditional approaches are grounded on the built-in infrastructure in vehicles such as infrared sensors and radars, or additional hardware like EEG devices and alcohol sensors, which involves high cost. The authors illustrate that smartphone sensing technology, which involves sensors embedded in smartphones (including the accelerometer, gyroscope, speaker, microphone, etc.), can be applied in sensing vehicle dynamics and driving behaviors. Chapter
暂无评论