0101~0102_天獄園2
1231~0102_金網寒假動漫節

英文書 > 全部商品

Non-Reputable Identity Management and Information Access Technologies for Improved Cyberspace Agility by 2035

Biblioscholar 出版
2025/08/08 出版

The military's use of cyberspace as a warfighting domain in current operations is vulnerable to hackers and malware. Today's cyber defense strategy is based on trust and perimeter boundaries. This strategy provides the DoD with little room for strategic or tactic errors and exposes our information superiority advantages to unnecessary risk. Emerging threats are becoming more sophisticated and organized, eroding the US's asymmetric advantage in cyberspace. By 2035, the emerging threats posed by insider threats, artificial intelligence and nation-states such as China will require game-changing innovations to defend cyberspace. The goal of this research paper is to propose an identity management and information access solution capable of mitigating emerging threats to military cyberspace operations in the year 2035. This solution requires that eight major technical challenges be overcome. This paper answers the following question for DoD strategic planners: What technologies and programs should the DoD invest in today in order to mitigate emerging threats to freedom of action in cyberspace by 2035? It answers this question by surveying the existing operational environment and comparing that with three of the most probable emerging threats to cyber operations between now and 2035. Finally, the paper highlights a potential solution to these threats given current capabilities and uses backcasting to identify the required variables, policy changes, and technology challenges.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價590
立即代訂
下次再買

Dominating Networks in Cyberspace

Biblioscholar 出版
2025/08/08 出版

Recognized as an equal to the air, land, sea and space domains, US military operators must gain dominance over cyberspace, in order to maintain its superior edge in military operations throughout the world. Cyberspace "dominance" over computer networks can be achieved, but only in providing support for freedom of action to friendly forces, within the other domains. Doctrine played an important role in defining the fundamental idea of cyber dominance. In addition, an extensive literature review of books, reports and recent articles from the Internet security sites provided the background on cyber threats in the world and the laws that governed military operations in cyberspace. The paper culminates in applying this information in a scenario of a cyber attack from China on the US. It shows the effects a network attack could have and proves how cyber dominance can be achieved.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價590
立即代訂
下次再買

The Novel Machine

2025/08/07 出版

The Novel Machine: Every Prompt & Response Used to Write the Novel Steelhead GraveyardStep behind the curtain of modern fiction writing and witness the raw, unfiltered creative process that brought a haunting wilderness thriller to life.The Novel Machine is not your typical writing guide. This groundbreaking companion book reveals every single prompt and AI-generated response used by author S.G. Potter to create his gripping novel Steelhead Graveyard-a chilling psychological thriller set deep in the misty wilds of the Pacific Northwest.Whether you're a curious reader, a writer seeking inspiration, or an AI enthusiast eager to understand how cutting-edge tools like ChatGPT and CoAuthorGPT can supercharge creativity, this book gives you a front-row seat to the entire writing journey-from brainstorming and character creation to the final spine-tingling scenes.You'll discover: The exact prompt-by-prompt blueprint used to develop Steelhead GraveyardThe collaborative back-and-forth between author and AI that shaped characters, plot twists, and haunting atmospheresA powerful learning tool for aspiring authors and educators in the world of AI-assisted storytellingDon't just read a thriller-reverse-engineer one.���� Bonus Tip: For the full experience, grab a copy of Steelhead Graveyard and read alongside this behind-the-scenes guide.

9 特價771
立即代訂
下次再買

The Cranky Man's Guide to LoRA & QLoRA

F P,Ham  著
2025/08/07 出版

This book is presented as a highly personal, opinionated, and practical guide to fine-tuning Large Language Models (LLMs), specifically using LoRA and QLoRA techniques. Written in a distinctly cranky, humorous, and often cynical voice by an experienced programmer and LLM tool builder ("Cranky Man"), it aims to cut through AI hype and technical jargon to provide hard-won lessons learned from extensive experimentation and failure.The author will guide you through the minefield of AI terms and concepts and you will emerge at the other side, preferably still with your sanity intact.So, what can you expect from this book?A solid grounding in the theory of Large Language Models, without getting bogged down in the details and math. You'll learn about the different types of models, quantization, how to choose the right one for the job, and how to train it.What all of the rank, alpha, batch_size or gradient accumulation actually do. In a plain language.You'll discover the tricks of the trade, the secrets of data collection, preparation and augmentation.You'll learn how to set up and use the hardware and software; even how to build your own multi-GPU AI supercomputer.How to read the tea leaves: Demystify the training process by learning to interpret those inscrutable loss graphs, and tell when your model is actually learning, when it's just memorizing the training data, and when it's blissfully and expensively dead.How to sidestep the pitfalls: Benefit from Cranky Man's hard-won experience and avoid the most common CUDA errors, Python tantrums and soul-crushing weight of unmet expectations.The author, F.P. HAM aka Cranky Man, is a real-world senior programmer. He didn't just use the training tools, he contributed and built many of them! From the rage-coded Training PRO, to the VirtualLora, Twinbook, Playground or Storycrafter.Cranky Man has been there, done that, got the T-shirt, the GPU burn marks and the electricity bills to prove it!This book is the result of thousands of experiments, the successes, the near misses, the total disasters. It is the story of one man's obsessive quest to create the ultimate AI model.So, there you have it. The definitive guide to training your own Large Language Model. If you're serious about getting into AI, this is the book for you. It's the one book that Cranky Man wished he'd had when he started out. He says it would have saved him a small country GDP-worth in electricity.

9 特價1935
立即代訂
下次再買

Philosophy.Exe

CRC Press 出版
2025/08/07 出版

Blending classical philosophy, cognitive science, AI ethics, and behavioral psychology, this book provides an adaptive framework for understanding the world.

9 特價2861
立即代訂
下次再買

The Psychology of Cybersecurity

Routledge 出版
2025/08/06 出版

This book takes a fresh look at the psychology of cybersecurity and IT management, discussing the role of cognitive bias and human factors on poor decisions. The book considers the psychology and motivations of those involved with cybersecurity both as cyber attackers and cyber defenders.

9 特價9063
立即代訂
下次再買

Artificial Intelligence for Natural Language Processing

CRC Press 出版
2025/08/05 出版

Artificial Intelligence for Natural Language Processing offers a comprehensive exploration of how advanced computational methods are transforming the way machines understand human language.

9 特價7155
立即代訂
下次再買

Artificial Intelligence for Natural Language Processing

CRC Press 出版
2025/08/05 出版

Artificial Intelligence for Natural Language Processing offers a comprehensive exploration of how advanced computational methods are transforming the way machines understand human language.

9 特價2861
立即代訂
下次再買

Scams, Hacking, and Cybersecurity

2025/08/04 出版

The internet is a powerful tool connecting us in ways unimaginable just a few decades ago. However, it also harbors risks-cyber scams, cyber crimes, and hidden dangers lurking on the dark web. Hackers and cybercriminals exploit vulnerabilities to steal data, commit identity theft, and manipulate systems using social engineering.But how safe are we online? Should we avoid the digital world entirely? Not at all. Just like real-world dangers, we can navigate online security risks with the right tools and knowledge.This cybersecurity bible is the ultimate guide to protecting yourself in the digital landscape. Whether you're looking for cybersecurity for beginners, insights into cyber hacking and the law, or best cybersecurity books to improve your internet safety, this book equips you with practical tools and strategies.You'll learn how to: Shield yourself from scams, phishing scams, and cybercrimes while securing your data.Build strong defenses against hackers and cyber threats.Safeguard your privacy and master internet safety across social media platforms.Implement cyber safety for seniors tips to protect vulnerable users.Understand cyber threat intelligence and navigate the dark web for dummies.Written by cybersecurity expert May Brooks-Kempler, whose passion for cybersecurity awareness began in the 1990s while exploring hacking communities, this cybersecurity for dummies 2024 guide blends storytelling with actionable strategies. It's not just another cyber security book-it's your practical anti-hacking guide to navigating the digital age safely."Scams, Hacking, and Cybersecurity is an essential cyber security book for anyone looking to understand the human side of cybersecurity. May Brooks is the perfect guide through this complex landscape, offering insights and advice that are both relevant and timely." -Keren Elazari, The Friendly Hacker"I couldn't put this book down. May's storytelling not only exposes the emotional aspect of cyber risks but also provides practical cybersecurity tools and techniques to enhance your security posture immediately." -Clar Rosso, CEO, ISC2Don't leave your online security to chance. Equip yourself with the ultimate cyber security bible and learn how to protect yourself from cybercrime, safeguard your privacy, and stay safe in the ever-evolving digital world.

9 特價693
立即代訂
下次再買

Scams, Hacking, and Cybersecurity

2025/08/04 出版

The internet is a powerful tool connecting us in ways unimaginable just a few decades ago. However, it also harbors risks-cyber scams, cyber crimes, and hidden dangers lurking on the dark web. Hackers and cybercriminals exploit vulnerabilities to steal data, commit identity theft, and manipulate systems using social engineering.But how safe are we online? Should we avoid the digital world entirely? Not at all. Just like real-world dangers, we can navigate online security risks with the right tools and knowledge.This cybersecurity bible is the ultimate guide to protecting yourself in the digital landscape. Whether you're looking for cybersecurity for beginners, insights into cyber hacking and the law, or best cybersecurity books to improve your internet safety, this book equips you with practical tools and strategies.You'll learn how to: Shield yourself from scams, phishing scams, and cybercrimes while securing your data.Build strong defenses against hackers and cyber threats.Safeguard your privacy and master internet safety across social media platforms.Implement cyber safety for seniors tips to protect vulnerable users.Understand cyber threat intelligence and navigate the dark web for dummies.Written by cybersecurity expert May Brooks-Kempler, whose passion for cybersecurity awareness began in the 1990s while exploring hacking communities, this cybersecurity for dummies 2024 guide blends storytelling with actionable strategies. It's not just another cyber security book-it's your practical anti-hacking guide to navigating the digital age safely."Scams, Hacking, and Cybersecurity is an essential cyber security book for anyone looking to understand the human side of cybersecurity. May Brooks is the perfect guide through this complex landscape, offering insights and advice that are both relevant and timely." -Keren Elazari, The Friendly Hacker"I couldn't put this book down. May's storytelling not only exposes the emotional aspect of cyber risks but also provides practical cybersecurity tools and techniques to enhance your security posture immediately." -Clar Rosso, CEO, ISC2Don't leave your online security to chance. Equip yourself with the ultimate cyber security bible and learn how to protect yourself from cybercrime, safeguard your privacy, and stay safe in the ever-evolving digital world.

9 特價1100
立即代訂
下次再買

AI Rookies Natural Language Processing

2025/08/04 出版

Start your NLP journey by mastering the messy middle-text preprocessing. This beginner-friendly guide introduces you to the core skills every aspiring NLP practitioner needs, such as cleaning and tokenizing text, handling stop words, stemming and lemmatization, and converting text into features. You'll then explore foundational tasks like text classification and sentiment analysis using real-world datasets. With no-code and plain-language explanations, this book makes natural language processing approachable and practical-even if you're just getting started.Pair this book with companion books with lab exercises to practice (available in R and Orange), slides, solution guides and more available resources at our website to bring your learning analytics to life.

9 特價1565
立即代訂
下次再買

From Day Zero to Zero Day

Eugene,Lim  著
No Starch Press 出版
2025/08/03 出版

Find vulnerabilities before anyone else does. Zero days aren't magic--they're missed opportunities. From Day Zero to Zero Day teaches you how to find them before anyone else does. In this hands-on guide, award-winning white-hat hacker Eugene "Spaceraccoon" Lim breaks down the real-world process of vulnerability discovery. You'll retrace the steps behind past CVEs, analyze open source and embedded targets, and build a repeatable workflow for uncovering critical flaws in code. Whether you're new to vulnerability research or sharpening an existing skill set, this book will show you how to think--and work--like a bug hunter. You'll learn how to: Identify promising targets across codebases, protocols, and file formats. Trace code paths with taint analysis and map attack surfaces with precision.Reverse engineer binaries using Ghidra, Frida, and angr.Apply coverage-guided fuzzing, symbolic execution, and variant analysis.Build and validate proof-of-concept exploits to demonstrate real-world impact.More than a toolkit, this is a window into how top vulnerability researchers approach the work. You'll gain not just techniques but also the mindset to go deeper, ask better questions, and find what others miss. If you're ready to stop reading write-ups and start writing them, From Day Zero to Zero Day is your guide.

9 特價1890
立即代訂
下次再買

The Dark Cloud

Plexity Digital 出版
2025/08/02 出版

Cybersecurity has shifted from a technical footnote to a central crisis of modern life. The Dark Cloud explores how digital dependence has created a world where convenience and vulnerability are inseparable. Every connected device, every stored piece of data, and every automated system introduces new risks not through malice, but through design. This book is not about fearmongering; it's about visibility. It reveals how attacks unfold not with brute force, but through deception, patience, and exploitation of the gaps between humans and machines.The threats are no longer theoretical. Hackers don't just steal data; they manipulate it. Breaches aren't always detected immediately sometimes, systems are silently controlled for months before anyone notices. From phishing scams that prey on trust to AI-powered malware that evolves to evade detection, the methods grow more sophisticated while the weakest link remains unchanged: human behavior.But the stakes extend beyond personal data. Cybercrime fuels a shadow economy on the dark web, where stolen credentials and hacking tools are bought and sold. Nation-states weaponize code to disrupt elections, disable infrastructure, and wage wars without physical casualties. Even the most secure organizations are only one employee's mistake away from catastrophe.The Dark Cloud goes beyond diagnosing the problem it offers a way forward. Security isn't just about stronger passwords or better firewalls; it's about reshaping how we think about risk. Systems must be designed to fail safely, not just operate perfectly. Users must question, not just trust. Governments and corporations must prioritize resilience over convenience.This book is for anyone who uses technology which means everyone. It's a guide to recognizing the invisible threats woven into daily life and a roadmap for reclaiming control in an era where everything connected can be compromised. The digital age doesn't have to be a trap, but escaping the dark cloud requires seeing it first.

9 特價677
立即代訂
下次再買

AI Rookies Labs Learn Text Analytics and NLP using R

2025/08/01 出版

Master text analytics and natural language processing-one lab at a time.This lab-based workbook is your no-fluff, beginner-friendly path to learning text analytics and NLP using real R code. You'll work hands-on with real data and clear examples as you move from tokenization and stopword removal to sentiment analysis, topic modeling, classification, embeddings, and more.Each lab walks you through the entire process-installing packages, running code, understanding output-without assuming any prior programming experience. Whether you're a student, instructor, or data-curious learner, this book helps you build real skills in text mining and natural language processing using R and RStudio.If you want to learn by doing, not just reading, this is your starting point.Extensive resources and supplements are available from the publisher (code, data, slides and more) for teaching and self study.

9 特價1692
立即代訂
下次再買

AI Ethics

Mindful Pages 出版
2025/08/01 出版

As machines grow smarter, the real challenge isn't what AI can do-but what it should do. This urgent and thought-provoking guide tackles the pressing ethical questions surrounding artificial intelligence, from bias in algorithms to the moral implications of autonomous systems. It explores how our values, laws, and philosophical frameworks must evolve in tandem with machines that now make decisions about healthcare, security, employment, and human identity. Inside, you'll uncover: - The hidden biases coded into AI systems and their real-world impacts - What accountability looks like in machine-led decision-making - How ancient moral philosophy applies to futuristic tech - The dangers of unchecked automation and ethical "outsourcing" - The frameworks emerging to build a more transparent and fair digital future Perfect for tech professionals, policy thinkers, and curious citizens, this book offers a clear, accessible, and deeply reflective journey through the ethical maze of our AI-driven era. It will equip readers to ask smarter questions, challenge passive adoption, and advocate for a future where humanity stays at the centre of innovation.

9 特價1511
立即代訂
下次再買

AI Rookies Labs Beginning NLP with Orange

2025/08/01 出版

Master text analytics and natural language processing-one lab at a time.This lab-based workbook is your beginner-friendly path to learning text analytics and NLP with Orange Data Mining's visual workflows. You'll work hands-on with real data and clear examples as you move from tokenization and stop word removal to sentiment analysis, topic modeling, classification, embeddings, and more.Each lab guides you step by step-building workflows, connecting components, interpreting results-no programming required. Whether you're a student, instructor, or data-curious learner, this book helps you build real skills in text mining and natural language processing using Orange.If you want to learn by doing, this is your starting point.

9 特價1692
立即代訂
下次再買

A smart Healthcare System

2025/08/01 出版

The book "Smart Healthcare Systems: Reducing False Predictions of Chronic Diseases Using IoT and Machine Learning" presents an innovative, cost-effective IoT-based Ambulatory Blood Pressure Monitoring (IABPM) system aimed at real-time tracking and early detection of Chronic Heart Disease (CHD). It leverages wearable sensors and cloud integration to record blood pressure and pulse data throughout the day, enhancing patient mobility and care. The system applies ML algorithms like Na簿ve Bayes, KNN, Decision Tree, SVM, and XGBoost to clinical datasets (SMHRCE and Kaggle) to predict Early Warning Scores (EWS). The proposed model shows high accuracy (up to 99.85%) and helps reduce healthcare costs, support proactive intervention, and improve diagnostic precision. The project bridges gaps in traditional ABPM systems by offering continuous monitoring, automated alerts, and cloud accessibility-paving the way for improved chronic disease management through technology integration.

9 特價3528
立即代訂
下次再買

Interagency Organization for Cyberwar

2025/07/31 出版

Many people take for granted things they cannot see, smell, or touch. For most people, security in cyberspace is one of these things. Aside from the securing their home personal computer with the latest anti-virus, the majority of Americans take government and corporate cyber security for granted assuming the professionals have security of the nation's military networks, sensitive government data, and consumers' personal data and financial information under control. Outside of an occasional news story about a denial of service internet attack or an "I Love You" virus, what goes on behind the closed compact disc drive doors does not concern most of the nation. The chilling fact is the nation should be concerned about what is going on in cyberspace. Since the terrorist attacks on 9/11, the nation has taken a renewed interest in securing the homeland, to include efforts to protect the countries critical infrastructure such as electrical plants, dams, and water supplies. It is no secret that terrorists are interested in striking these targets with the intent of inflicting catastrophic physical and economic damage to western civilization. What many people do not realize is, the computer network systems which monitor and manage these systems, and many others, are also under attack by what some are calling cyber terrorists. Although the government and industry has undertaken a significant amount of effort to protect the nation's military, non-military government, financial, and industrial networks, more work is necessary.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1140
立即代訂
下次再買

Defining Our National Cyberspace Boundaries

2025/07/31 出版

In February 2009, the Obama Administration commissioned a 60-day review of the United States' cyber security. A near-term action recommended by the 60-day review was to prepare an updated national strategy to secure information and communications infrastructure.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1140
立即代訂
下次再買

A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks

2025/07/31 出版

In this thesis, we analyze various factors that affect quality of service (QoS) communication in high-speed, packet-switching sub-networks. We hypothesize that sub-network-wide bandwidth reservation and guaranteed CPU processing power at endpoint systems for handling data traffic are indispensable to achieving hard end-to-end quality of service. Different bandwidth reservation strategies, traffic characterization schemes, and scheduling algorithms affect the network resources and CPU usage as well as the extent that QoS can be achieved. In order to analyze those factors, we design and implement a communication layer. Our experimental analysis supports our research hypothesis. The Resource ReSerVation Protocol (RSVP) is designed to realize resource reservation. Our analysis of RSVP shows that using RSVP solely is insufficient to provide hard end-to-end quality of service in a high-speed sub-network. Analysis of the IEEE 802.lp protocol also supports the research hypothesis.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Cyberspace and the New Age of Influence

2025/07/31 出版

The importance of cyberspace and the utility of networked computer systems have grown exponentially over the past 20 years. For this reason, this study advances a theory for operations in cyberspace that uses the cyber domain to strategically influence an adversary in a context prior to armed conflict. It addresses different types of operations by initially examining parallel constructs from classical airpower theory. It goes on to analyze cyber operations in light of recently demonstrated international cyber events as well as analogues from air warfare, counterinsurgency warfare, and information operations. The analysis demonstrates that capabilities developed to exploit the unique nature of the cyber domain can be extremely persuasive if properly integrated into a well-crafted grand strategy. Effects created within the cyber domain can have real-world results that drive an opposing state's leaders to make decisions favorable to the state that is able to weild power in the domain. These operations can focus on the critical infrastructure of another state, its indigenous population, or even the leaders, themselves.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Secureqemu

2025/07/31 出版

This research presents an original emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing, respectively. Protection mechanisms execute in trusted emulators while remaining out-of-band of untrusted systems being emulated. This protection scheme is called SecureQEMU and is based on a modi ed version of Quick Emulator (QEMU). RCE is a process that uncovers the internal workings of a program. It is used during vulnerability and intellectual property (IP) discovery. To protect from RCE program code may have anti-disassembly, anti-debugging, and obfuscation techniques incorporated. These techniques slow the process of RCE, however, once defeated protected code is still comprehensible.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

What Senior Leaders Need to Know About Cyberspace

2025/07/31 出版

What must senior security leaders know about cyberspace to transform their organizations and make wise decisions? How does the enduring cyberspace process interact with and transform organizations, technology, and people, and, in turn, how do they transform cyberspace itself? To evaluate these questions, this essay establishes the enduring nature of the cyberspace process and compares this relative constant to transformation of organizations and people. Each section discussing these areas provides an assessment of their status as well as identifies key issues for senior security leaders to comprehend now and work to resolve in the future. Specific issues include viewing cyberspace as a new strategic common akin to the sea, comparing effectiveness of existing hierarchies in achieving cybersecurity against networked adversaries, and balancing efficiency and effectiveness of security against the universal laws of privacy and human rights.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1140
立即代訂
下次再買

Cyberspace

2025/07/31 出版

In the last century, the United States was protected from a direct physical attack by its adversaries due to its geographic isolation. However, today any adversary with sufficient capability can exploit vulnerabilities in the United States' critical network infrastructures using cyber warfare and leverage physical attacks to significantly impact the lives of its citizens and erode their confidence in its ability to protect their way of life. This AY-10 student research paper provides information to assist senior leaders working to prevent or to minimize the effects of future cyber attacks by a nation state or non-state actor against the United States' critical network infrastructures.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1140
立即代訂
下次再買

Multicast Algorithms for Mobile Satellite Communication Networks

2025/07/31 出版

With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. Each protocol was subjected to various workload, to include changes in the number of source nodes and the amount of traffic generated by these nodes. Results from the simulation trials show the ODMRP protocol provided greater than 99% reliability in packet deliverability, at the cost of more than 8 bits of overhead for every 1 bit of data for multicast groups with multiple sources. In contrast, DVMRP proved robust and scalable, with data-to-overhead ratios increasing logarithmically with membership levels. DVMRP also had less than 70 ms of average end- to-end delay, providing stable transmissions at high loading and membership levels. Due to the fact that system performance metric values varied as a function of protocol, system design objectives must be considered when choosing a protocol for implementation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Automating Security Protocol Analysis

2025/07/31 出版

When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took over 18 years to discover that even with the most secure encryption, the conversations using this protocol were still subject to penetration. To date, there is still no one protocol that is accepted for universal use. Because of this, analysis of the protocol outside the encryption is becoming more important. Recent work by Joshua Guttman and others [9] have identified several properties that good protocols often exhibit. Termed "Authentication Tests", these properties have been very useful in examining protocols. The purpose of this research is to automate these tests and thus help expedite the analysis of both existing and future protocols. The success of this research is shown through rapid analysis of numerous protocols for the existence of authentication tests. The result of this is that an analyst is now able to ascertain in near real-time whether or not a proposed protocol is of a sound design or whether an existing protocol may contain previously unknown weaknesses. The other achievement of this research is the generality of the input process involved. Although there exist other protocol analyzers, their use is limited primarily due to their complexity of use. With the tool generated here, an analyst needs only to enter their protocol into a standard text file; and almost immediately, the analyzer determines the existence of the authentication tests.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Performance Analysis of Protocol Independent Multicasting-Dense Mode in Low Earth Orbit Satellite Networks

2025/07/31 出版

This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM) in a LEO satellite constellation. PIM-DM is a terrestrial protocol for distributing traffic efficiently between subscriber nodes by combining data streams into a tree-based structure, spreading from the root of the tree to the branches. Using this structure, a minimum number of connections are required to transfer data, decreasing the load on intermediate satellite routers. The PIM-DM protocol was developed for terrestrial systems and this research implemented an adaptation of this protocol in a satellite system. This research examined the PIM-DM performance characteristics which were compared to earlier work for On- Demand Multicast Routing Protocol (ODMRP) and Distance Vector Multicasting Routing Protocol (DVMRP) - all in a LEO satellite network environment. Experimental results show that PIM-DM is extremely scalable and has equivalent performance across diverse workloads.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Enabling Intrusion Detection in IPSec Protected IPv6 Networks Through Secret-Key Sharing

2025/07/31 出版

As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (IPSec) features embedded into the next-generation protocol will become more accessible than ever. Though the networklayer encryption provided by IPSec is a boon to data security, its use renders standard network intrusion detection systems (NIDS) useless. The problem of performing intrusion detection on encrypted traffic has been addressed by differing means with each technique requiring one or more static secret keys to be shared with the NIDS beforehand.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

In Pursuit of an Aptitude Test for Potential Cyberspace Warriors

2025/07/31 出版

The Air Force has officially assumed the cyberspace mission. In order to perform the mission to the best extent possible, it is important to employ personnel with the necessary skill sets and motivation to work in this type of environment. The first step in employing the right people is to screen all possible candidates and select those with an aptitude for acquiring the skill sets and the motivation to perform this work. This thesis is an attempt to determine the necessary skills and motivations to perform this work and recommend a screening process to select the candidates with the highest probability for success. Since this mission is new, determining what skills and motivations are necessary is difficult. To assist in determining the skills and motivations for cyber warriors, this thesis considers the skills and motivations of computer hackers. If the skills and motivations of successful hackers can be identified, those skills and motivations can be used as a tool for developing an aptitude test to be used as a screening device. Aptitude tests have proven to be a valuable resource to the military and academia. A blueprint for an aptitude test is provided based on the findings of the hacker skills and motivations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States

2025/07/31 出版

U.S. Response Strategy for Cyber Attacks The United States has traditionally looked to its military to defend against all foreign enemies. International telecommunications and computer networks and globalization have now overcome the military's absolute ability to provide for that common defense. More than capable to respond to attacks in traditional war fighting domains of land, sea, air, and even space, the military will not be able to prevent all cyber attacks against U.S. interests. As a result, the U.S. should establish and announce the nature of its strategic responses to cyber attacks - including legal prosecution, diplomacy, or military action. Such a policy pronunciation will serve both as a deterrent to potential attackers and likely be established as a normative international standard. The outline for a response policy begins by addressing attacks based upon the prevailing security environment - peacetime or conflict. The U.S. should respond to peacetime attacks based on the target, reasonably expected damage, attack type, and source. Attacks likely to cause significant injuries and damage warrant a full spectrum of response options, while state-sponsored attacks would justify a forcible response when their type and target indicate destructive effects including widespread injury and damage.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1140
立即代訂
下次再買

Virtualization Technology Applied to Rootkit Defense

2025/07/31 出版

This research effort examines the idea of applying virtualization hardware to enhance operating system security against rootkits. Rootkits are sets of tools used to hide code and/or functionality from the user and operating system. Rootkits can accomplish this feat through using access to one part of an operating system to change another part that resides at the same privilege level. Hardware assisted virtualization (HAV) provides an opportunity to defeat this tactic through the introduction of a new operating mode. Created to aid operating system virtualization, HAV provides hardware support for managing and saving multiple states of the processor. This hardware support overcomes a problem in pure software virtualization, which is the need to modify guest software to run at a less privileged level. Using HAV, guest software can operate at the pre-HAV most privileged level. This thesis provides a plan to protect data structures targeted by rootkits through unconventional use of HAV technology to secure system resources such as memory. This method of protection will provide true real-time security through OS attack prevention, rather than reaction.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Developing Cyberspace Data Understanding

2025/07/31 出版

Current intrusion detection systems generate a large number of specific alerts, but do not provide actionable information. Many times, these alerts must be analyzed by a network defender, a time consuming and tedious task which can occur hours or days after an attack occurs. Improved understanding of the cyberspace domain can lead to great advancements in Cyberspace situational awareness research and development. This thesis applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding about a host system under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of host-based data collectors. Through knowledge discovery, features are identified within the data collected which can be used to enhance host-based intrusion detection. By discovering relationships between the data collected and the events, human understanding of the activity is shown.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags

2025/07/31 出版

Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are limited by the resources available to the sensor nodes that make up the WSN. The most significant resource is energy; a WSN may be deployed to an inhospitable or unreachable area leaving it with a non-replenishable power source. This research examines a technique of reducing energy consumption by augmenting the nodes with radio frequency identification (RFID) tags that contain routing information. It was expected that RFID tags would reduce the network throughput, AODV routing traffic sent, and the amount of energy consumed. However, RFID tags have little effect on the network throughput or the AODV routing traffic sent. They also increase ETE delays in sparse networks as well as the amount of energy consumed in both sparse and dense networks. Furthermore, there was no statistical difference in the amount of user data throughput received. The density of the network is shown to have an effect on the variation of the data but the trends are the same for both sparse and dense networks. This counter-intuitive result is explained and conditions for such a scheme to be effective are discussed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Evaluation of the Effects of Predicted Associativity on the Reliability and Performance of Mobile Ad Hoc Networks

2025/07/31 出版

Routing in Mobile Ad Hoc Networks (MANETs) presents unique challenges not encountered in conventional networks. Limitations in bandwidth and power as well as a dynamic network topology must all be addressed in MANET routing protocols. Predicted Associativity Routing (PAR) is a custom routing protocol designed to address reliability in MANETs. By collecting associativity information on links, PAR calculates the expected lifetime of neighboring links. During route discovery, nodes use this expected lifetime, and their neighbor's connectivity to determine a residual lifetime. The routes are selected from those with the longest remaining lifetimes. Thus, PAR attempts to extend the duration routes are active, thereby improving their reliability. PAR is compared to Ad Hoc On-Demand Distance Vector Routing (AODV) using a variety of reliability and performance metrics. Despite its focus on reliability, PAR does not provide more reliable routes. Rather, AODV produces routes which last as much as three times longer than PAR. However PAR, even with shorter lasting routes, delivers more data and has greater throughput. Both protocols are affected most by the node density of the networks. Node density accounts for 48.62% of the variation in route lifetime in AODV, and 70.66% of the variation in PAR. As node density increases from 25 to 75 nodes route lifetimes are halved, while throughput increases drastically with the increased routing overhead. Furthermore, PAR increases end-to-end delay, while AODV displays better efficiency.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks

2025/07/31 出版

This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley's TinyOS operating system for wireless sensor networks.The attack exploits the short period of the pseudorandom number generator (PRNG) usedby the cryptosystem to generate private keys. The attack assumes a laptop is listeningpromiscuously to network traffic for key messages and requires only the sensor node'spublic key and network address to discover the private key. Experimental results showthat roughly 50% of the address space leads to a private key compromise in 25 minuteson average.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買

Automating Security Protocol Analysis

2025/07/31 出版

When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took over 18 years to discover that even with the most secure encryption, the conversations using this protocol were still subject to penetration. To date, there is still no one protocol that is accepted for universal use. Because of this, analysis of the protocol outside the encryption is becoming more important. Recent work by Joshua Guttman and others [9] have identified several properties that good protocols often exhibit. Termed "Authentication Tests", these properties have been very useful in examining protocols. The purpose of this research is to automate these tests and thus help expedite the analysis of both existing and future protocols. The success of this research is shown through rapid analysis of numerous protocols for the existence of authentication tests. The result of this is that an analyst is now able to ascertain in near real-time whether or not a proposed protocol is of a sound design or whether an existing protocol may contain previously unknown weaknesses. The other achievement of this research is the generality of the input process involved. Although there exist other protocol analyzers, their use is limited primarily due to their complexity of use. With the tool generated here, an analyst needs only to enter their protocol into a standard text file; and almost immediately, the analyzer determines the existence of the authentication tests.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買

Speech Recognition Using the Mellin Transform

2025/07/31 出版

The purpose of this research was to improve performance in speech recognition. Specifically, a new approach was investigating by applying an integral transform known as the Mellin transform (MT) on the output of an auditory model to improve the recognition rate of phonemes through the scale-invariance property of the Mellin transform. Scale-invariance means that as a time-domain signal is subjected to dilations, the distribution of the signal in the MT domain remains unaffected. An auditory model was used to transform speech waveforms into images representing how the brain "sees" a sound. The MT was applied and features were extracted. The features were used in a speech recognizer based on Hidden Markov Models. The results from speech recognition experiments showed an increase in recognition rates for some phonemes compared to traditional methods.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價675
立即代訂
下次再買

Enabling Intrusion Detection in IPSec Protected IPv6 Networks Through Secret-Key Sharing

2025/07/31 出版

As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (IPSec) features embedded into the next-generation protocol will become more accessible than ever. Though the networklayer encryption provided by IPSec is a boon to data security, its use renders standard network intrusion detection systems (NIDS) useless. The problem of performing intrusion detection on encrypted traffic has been addressed by differing means with each technique requiring one or more static secret keys to be shared with the NIDS beforehand.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價675
立即代訂
下次再買

An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment

2025/07/31 出版

The purpose of this research is to develop a standardized Information Asset Valuation (IAV) methodology. The IAV methodology proposes that accurate valuation for an Information Asset (InfoA) is the convergence of information tangible, intangible, and flow attributes to form a functional entity that enhances mission capability. The IAV model attempts to quantify an InfoA to a single value through the summation of weighted criteria. Standardizing the InfoA value criteria will enable decision makers to comparatively analyze dissimilar InfoAs across the tactical, operational, and strategic domains. This research develops the IAV methodology through a review of existing military and non-military valuation methodologies. IAV provides the Air Force (AF) and Department of Defense (DoD) with a standardized methodology that may be utilized enterprise wide when conducting risk and damage assessment and risk management. The IAV methodology is one of the key functions necessary for the Cyber Incident Mission Impact Assessment (CIMIA) program to operationalize a scalable, semi-automated Decision Support System (DSS) tool. The CIMIA DSS intends to provide decision makers with near real-time cyber awareness prior to, during, and post cyber incident situations through documentation of relationships, interdependencies, and criticalities among information assets, the communications infrastructure, and the operations mission impact.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買

Cyberspace and the New Age of Influence

2025/07/31 出版

The importance of cyberspace and the utility of networked computer systems have grown exponentially over the past 20 years. For this reason, this study advances a theory for operations in cyberspace that uses the cyber domain to strategically influence an adversary in a context prior to armed conflict. It addresses different types of operations by initially examining parallel constructs from classical airpower theory. It goes on to analyze cyber operations in light of recently demonstrated international cyber events as well as analogues from air warfare, counterinsurgency warfare, and information operations. The analysis demonstrates that capabilities developed to exploit the unique nature of the cyber domain can be extremely persuasive if properly integrated into a well-crafted grand strategy. Effects created within the cyber domain can have real-world results that drive an opposing state's leaders to make decisions favorable to the state that is able to weild power in the domain. These operations can focus on the critical infrastructure of another state, its indigenous population, or even the leaders, themselves.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價675
立即代訂
下次再買

Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems

2025/07/31 出版

Since information systems have become smaller, faster, cheaper and more interconnected many organizations have become more dependent on them for daily operations and to maintain critical data. This reliance on information systems is not without risk of attack. Because these systems are relied upon so heavily the impact of such an attack also increases, making the protection of these systems essential. Information system security often focuses on the risk of attack and damage from the outsider. High-profile issues such as hackers, viruses and denial-of-service are generally emphasized in literature and other media outlets. A neglected area of computer security that is just as prevalent and potentially more damaging is the threat from a trusted insider. An organizational insider who misuses a system whether intentional or unintentional is often in a position to know where and how to access important information. How do we become aware of such activities and protect against this threat? This research was a historical analysis of the insider threat to information systems to develop a understanding and framework of the topic.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買

Evaluation of the Effects of Predicted Associativity on the Reliability and Performance of Mobile Ad Hoc Networks

2025/07/31 出版

Routing in Mobile Ad Hoc Networks (MANETs) presents unique challenges not encountered in conventional networks. Limitations in bandwidth and power as well as a dynamic network topology must all be addressed in MANET routing protocols. Predicted Associativity Routing (PAR) is a custom routing protocol designed to address reliability in MANETs. By collecting associativity information on links, PAR calculates the expected lifetime of neighboring links. During route discovery, nodes use this expected lifetime, and their neighbor's connectivity to determine a residual lifetime. The routes are selected from those with the longest remaining lifetimes. Thus, PAR attempts to extend the duration routes are active, thereby improving their reliability. PAR is compared to Ad Hoc On-Demand Distance Vector Routing (AODV) using a variety of reliability and performance metrics. Despite its focus on reliability, PAR does not provide more reliable routes. Rather, AODV produces routes which last as much as three times longer than PAR. However PAR, even with shorter lasting routes, delivers more data and has greater throughput. Both protocols are affected most by the node density of the networks. Node density accounts for 48.62% of the variation in route lifetime in AODV, and 70.66% of the variation in PAR. As node density increases from 25 to 75 nodes route lifetimes are halved, while throughput increases drastically with the increased routing overhead. Furthermore, PAR increases end-to-end delay, while AODV displays better efficiency.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買

A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks

2025/07/31 出版

In this thesis, we analyze various factors that affect quality of service (QoS) communication in high-speed, packet-switching sub-networks. We hypothesize that sub-network-wide bandwidth reservation and guaranteed CPU processing power at endpoint systems for handling data traffic are indispensable to achieving hard end-to-end quality of service. Different bandwidth reservation strategies, traffic characterization schemes, and scheduling algorithms affect the network resources and CPU usage as well as the extent that QoS can be achieved. In order to analyze those factors, we design and implement a communication layer. Our experimental analysis supports our research hypothesis. The Resource ReSerVation Protocol (RSVP) is designed to realize resource reservation. Our analysis of RSVP shows that using RSVP solely is insufficient to provide hard end-to-end quality of service in a high-speed sub-network. Analysis of the IEEE 802.lp protocol also supports the research hypothesis.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價675
立即代訂
下次再買

Developing Cyberspace Data Understanding

2025/07/31 出版

Current intrusion detection systems generate a large number of specific alerts, but do not provide actionable information. Many times, these alerts must be analyzed by a network defender, a time consuming and tedious task which can occur hours or days after an attack occurs. Improved understanding of the cyberspace domain can lead to great advancements in Cyberspace situational awareness research and development. This thesis applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding about a host system under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of host-based data collectors. Through knowledge discovery, features are identified within the data collected which can be used to enhance host-based intrusion detection. By discovering relationships between the data collected and the events, human understanding of the activity is shown.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買

Defeating 802.11 Wireless Networks

2025/07/31 出版

Homeland Security of the United States is constantly under threat of attack from terrorist organizations. A variable and current terrorist threat is the use of unmanned aerial vehicles (UAVs) as weapons of mass destruction. These UAVs can be built simply and cheaply from commercial off the shelf (COTS) parts and are typically controlled using standard radio control (RC) technology. An emerging technology that is being implemented to control and communicate with UAVs is the 802.11 wireless network protocol or Wi-Fi. This project discusses various portions of the Wi-Fi protocol and analyzes the protocol to determine techniques for first detecting and then defeating wireless networks utilizing the protocol through denial or deception. The first set of techniques presented defeats a network through denial. These denial techniques are divided into two categories: broad area denial techniques and specific network denial techniques. After denial techniques are discussed a process for decieving an 802.11 wireless network is presented.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價675
立即代訂
下次再買

An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application to the Detection of Distributed Computer Network Intrusions

2025/07/31 出版

Today's predominantly-employed signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus after a potentially successful attack, performing post-mortem analysis on that instance and encoding it into a signature that is stored in its anomaly database. The time required to perform these tasks provides a window of vulnerability to DoD computer systems. Further, because of the current maximum size of an Internet Protocol-based message, the database would have to be able to maintain 25665535 possible signature combinations. In order to tighten this response cycle within storage constraints, this thesis presents an Artificial Immune System-inspired Multiobjective Evolutionary Algorithm intended to measure the vector of tradeoff solutions among detectors with regard to two independent objectives: best classification fitness and optimal hypervolume size. Modeled in the spirit of the human biological immune system and intended to augment DoD network defense systems, our algorithm generates network traffic detectors that are dispersed throughout the network.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價887
立即代訂
下次再買

Secureqemu

2025/07/31 出版

This research presents an original emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing, respectively. Protection mechanisms execute in trusted emulators while remaining out-of-band of untrusted systems being emulated. This protection scheme is called SecureQEMU and is based on a modi ed version of Quick Emulator (QEMU). RCE is a process that uncovers the internal workings of a program. It is used during vulnerability and intellectual property (IP) discovery. To protect from RCE program code may have anti-disassembly, anti-debugging, and obfuscation techniques incorporated. These techniques slow the process of RCE, however, once defeated protected code is still comprehensible.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買

Performance Analysis of Protocol Independent Multicasting-Dense Mode in Low Earth Orbit Satellite Networks

2025/07/31 出版

This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM) in a LEO satellite constellation. PIM-DM is a terrestrial protocol for distributing traffic efficiently between subscriber nodes by combining data streams into a tree-based structure, spreading from the root of the tree to the branches. Using this structure, a minimum number of connections are required to transfer data, decreasing the load on intermediate satellite routers. The PIM-DM protocol was developed for terrestrial systems and this research implemented an adaptation of this protocol in a satellite system. This research examined the PIM-DM performance characteristics which were compared to earlier work for On- Demand Multicast Routing Protocol (ODMRP) and Distance Vector Multicasting Routing Protocol (DVMRP) - all in a LEO satellite network environment. Experimental results show that PIM-DM is extremely scalable and has equivalent performance across diverse workloads.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買
頁數3/103
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing