Case studies in secure computing : achievements and trends /: achievements and trends. (2014)
- Record Type:
- Book
- Title:
- Case studies in secure computing : achievements and trends /: achievements and trends. (2014)
- Main Title:
- Case studies in secure computing : achievements and trends
- Further Information:
- Note: Edited by Biju Issac and Nauman Israr.
- Editors:
- Issac, Biju
Israr, Nauman - Contents:
- Survey of Secure Computing; Kuruvilla Mathew and Biju Issac; Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection; Hari Om and Alok Kumar Gupta; Fuzzy Logic-Based Application Security Risk Assessment; Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya; Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks; Jayaprakash Kar; Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute Based Access Control; Jim Longstaff and Tony Howitt; Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments; Jonny Milliken, Kian Meng Yap, and Alan Marshall; Security Attacks and Countermeasures in Cloud Computing; Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan; Optimizing Ant-Based Internet Protocol Traceback; Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi; A Case Study on Security Issues in LT E Backhaul and Core Networks; Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov; A Case Study of Intelligent ID S False Alarm Reduction in Cloud Environments: Challenges and Trends; Yuxin Meng, We njuan Li, and Lam-For Kwok; Attacks in Wireless Sensor Networks and Their Countermeasures; Mukesh Kumar and Kamlesh Dutta; Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal; The Impact of Application-Layer Denial-of-ServiceSurvey of Secure Computing; Kuruvilla Mathew and Biju Issac; Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection; Hari Om and Alok Kumar Gupta; Fuzzy Logic-Based Application Security Risk Assessment; Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya; Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks; Jayaprakash Kar; Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute Based Access Control; Jim Longstaff and Tony Howitt; Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments; Jonny Milliken, Kian Meng Yap, and Alan Marshall; Security Attacks and Countermeasures in Cloud Computing; Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan; Optimizing Ant-Based Internet Protocol Traceback; Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi; A Case Study on Security Issues in LT E Backhaul and Core Networks; Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov; A Case Study of Intelligent ID S False Alarm Reduction in Cloud Environments: Challenges and Trends; Yuxin Meng, We njuan Li, and Lam-For Kwok; Attacks in Wireless Sensor Networks and Their Countermeasures; Mukesh Kumar and Kamlesh Dutta; Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal; The Impact of Application-Layer Denial-of-Service Attacks; Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani; Classification of Radical Messages on Twitter Using Security Associations; Pooja Wadhwa and M. P. S. Bhatia; Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric; Renato Cordeirode Amorim and Peter Komisarczuk; Reversible Watermarking: Theory and Practice; Ruchira Naskar and Rajat Subhra Chakraborty; Web Application Security Attacks and Countermeasures; Tushar Kanti Saha and A. B. M. Shawkat Ali; Security in Mobile Networks: A Novel Challenge and Solution; Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz; Web Session Security: Attack and Defense Techniques; Zachary Evans and Hossain Shahriar; Internet Botnets: A Survey of Detection Techniques; Boris Nechaev and Andrei Gurtov; Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case Study; Carlos F. Lerma Reséndez; A Novel Construction of Certificateless Signcryption Scheme for Smart Card; Jayaprakash Kar … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : Auerbach
- Publication Date:
- 2014
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 005.8
Computer security -- Case studies
Computer networks -- Security measures -- Case studies - Languages:
- English
- ISBNs:
- 9781482207071
- Related ISBNs:
- 9781482207064
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; item not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143914
- Ingest File:
- 02_196.xml