Focusing on network behavior analysis, this book explores the mining of Internet traffic data to identify and model behavioral patterns in various Internet entities, including end hosts and IoT devices. It aims to address the existing gap in literature on this crucial aspect of network security, highlighting its significance for data center, backbone, enterprise, and edge networks. By providing a thorough overview, it serves as a valuable resource for understanding and enhancing network security solutions in today's digital landscape.
Kuai Xu Livres



Modeling Information Diffusion in Online Social Networks with Partial Differential Equations
- 160pages
- 6 heures de lecture
Focusing on the intersection of mathematics and social media, this book introduces a dynamic modeling approach using partial differential equations to analyze information diffusion in online networks. It employs the Laplacian matrix to identify user communities, embedding them in Euclidean space for further analysis. The authors validate their models with Twitter data, exploring significant events like the Egyptian revolution and predicting influenza prevalence. This innovative method proposes a paradigm shift in understanding information flow, offering a foundation for future spatio-temporal modeling in the big-data era.
Wireless Algorithms, Systems, and Applications
10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings
- 875pages
- 31 heures de lecture
This book constitutes the proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015, held in Qufu, Shandong, China, in August 2015. The 36 revised full papers presented together with 5 revised short papers and 42 invited papers were carefully reviewed and selected from 133 initial submissions. The papers present current trends, challenges, and state-of-the-art solutions related to various issues in wireless networks. Topics of interests include effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks. .