Xin-Wen Wu, Ph.D.
is a faculty member of Computer Science at University of Mary Washington.
He teaches various courses in computer science and cyber security. He authored three books and over hundred research papers in theoretical and applied aspects of information and computer security.
This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined.
Puts forward a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks.
Includes a number of algorithms on multi-aspect anomaly detection in sensor networks.
Presents several algorithms on mobile agent transmission optimization in resource constrained sensor networks.
Highlights an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes.
Offers a detailed Petri Net-based formal modeling and analysis of the proposed system.
Includes an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization.