Binxing Fang - Böcker
Visar alla böcker från författaren Binxing Fang. Handla med fri frakt och snabb leverans.
11 produkter
11 produkter
1 244 kr
Skickas inom 3-6 vardagar
The three volume set provides a systematic overview of theories and technique on social network analysis. Volume 1 of the set mainly focuses on the structure characteristics, the modeling, and the evolution mechanism of social network analysis. Techniques and approaches for virtual community detection are discussed in detail as well. It is an essential reference for scientist and professionals in computer science.
1 244 kr
Skickas inom 3-6 vardagar
The three volume set provides a systematic overview of theories and technique on social network analysis.Volume 2 of the set mainly focuses on the formation and interaction of group behaviors. Users’ behavior analysis, sentiment analysis, influence analysis and collective aggregation are discussed in detail as well. It is an essential reference for scientist and professionals in computer science.
1 244 kr
Skickas inom 3-6 vardagar
The three volume set provides a systematic overview of theories and technique on social network analysis. Volume 3 of the set mainly focuses on the propagation models and evolution rules of information. Information retrieval and dissemination, topic discovery and evolution, algorithms of influence maximization are discussed in detail. It is an essential reference for scientist and professionals in computer science.
308 kr
Skickas inom 5-8 vardagar
308 kr
Skickas inom 5-8 vardagar
308 kr
Skickas inom 5-8 vardagar
Cyberspace Sovereignty
Reflections on building a community of common future in cyberspace
Inbunden, Engelska, 2018
1 276 kr
Skickas inom 10-15 vardagar
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
Cyberspace Sovereignty
Reflections on building a community of common future in cyberspace
Häftad, Engelska, 2019
1 064 kr
Skickas inom 10-15 vardagar
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
H4SD3: A Four-Honey Framework Based on Software-Defined Cyber Deception Defense
A Safeguard Defense Mode (SDM) for Proactive Cybersecurity Principles and Models
Inbunden, Engelska, 2026
855 kr
Kommande
Cyberattacks—especially those involving Advanced Persistent Threats (APTs)—are increasingly stealthy, sophisticated, and persistent, posing serious risks to global cybersecurity and national safety. Traditional defense mechanisms, often designed to block system breaches, struggle to keep pace with such adaptive threats.This open access book responds to these challenges by introducing a novel defensive paradigm: Safeguard Defense Mode (SDM). Developed through years of operational experience and cybersecurity drills, SDM is implemented via the Four-Honey System based on Software-Defined Deception Defense (H4SD3). This framework emphasizes early-stage APT detection, particularly during the reconnaissance phase, and shifts cybersecurity strategy from passive response to proactive guardianship.Key components of this book include:• Honeypoint: Lightweight threat detection using network and system tripwires• Honeyproxy: Traffic monitoring and anomaly detection gateway• Honeytrace: Attacker tracking and deterrence device• Honeycenter: Centralized decision and control hub• Software-Defined Deceptive Defense: A new concept for countering advanced threats• Deployment Cases: Insights from major events such as the Winter Olympics 2022, Asian Games 2023, Asian Winter Games 2025, and the Canton Fair (2016–2025)Designed for engineers, managers, researchers, and students in cybersecurity, this book presents technical solutions in an accessible format, using examples and metaphors to clarify complex ideas. While no prior expertise is required, a basic understanding of cybersecurity will enhance the reading experience.
Del 15470 - Lecture Notes in Computer Science
MDATA Cognitive Model: Theory and Applications
Häftad, Engelska, 2025
800 kr
Skickas inom 10-15 vardagar
This book presents the theoretical foundations of the MDATA cognitive model and its applications in the field of cybersecurity.
1 423 kr
Skickas inom 10-15 vardagar
color: #262626;">This book proposes the architecture of artificial intelligence (AI) security and safety, discusses the topics about AI for security, AI security and AI safety, and makes an in-depth study on the ethical code of AI security and safety.