Cloud security : concepts, applications and perspectives /: concepts, applications and perspectives. (2021)
- Record Type:
- Book
- Title:
- Cloud security : concepts, applications and perspectives /: concepts, applications and perspectives. (2021)
- Main Title:
- Cloud security : concepts, applications and perspectives
- Further Information:
- Note: Edited by Brij B. Gupta.
- Editors:
- Gupta, Brij, 1982-
- Contents:
- Secured IoT devices management in Cloud-Fog Environment using Blockchain Asutosh Kumar Biswal, Sourav Kanti Addya, Bibhudatta Sahoo and Ashok Kumar Turuk Integrating Cloud and Health Informatics: Approaches, Applications and Challenges Sheshang M Ajwalia, Anu Mary Chacko and Madhu Kumar S D A Flow Based Anomaly Detection System for Slow DDoS Attack on HTTP Muraleedharan N, and Janet B Explicating Fog Computing: Key Research Challenges and Solutions Vipin Singh, John Paul Martin, K. Chandrasekaran, and A Kandasamy Comparison of Various Techniques for Emergency Vehicle Detection using Audio Processing Eshwar Prithvi Jonnadula and Pabitra Mohan Khilar Cryptanalysis of a Robust ECC Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things Diksha Rangwani, Dipanwita Sadhukhan, and Sangram Ray Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment Dipanwita Sadhukhan and Sangram Ray Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber Physical Systems Dr. M. Sangeetha, Mathan Kumar M and Sakthi Kavin S.S. Active Forgery Detection inGrayscale Images using CRC-8based Fragile Watermarking Srilekha Paul and Arup Kumar Pal Android Malware Classification using Ensemble Classifiers Shivi Garg J.C. Bose, and Niyati Baliyan Provably Secure Lightweight Key Policy Attribute Based Encryption for Internet of Things K Sowjanya, and Mou Dasgupta An Improved TwoSecured IoT devices management in Cloud-Fog Environment using Blockchain Asutosh Kumar Biswal, Sourav Kanti Addya, Bibhudatta Sahoo and Ashok Kumar Turuk Integrating Cloud and Health Informatics: Approaches, Applications and Challenges Sheshang M Ajwalia, Anu Mary Chacko and Madhu Kumar S D A Flow Based Anomaly Detection System for Slow DDoS Attack on HTTP Muraleedharan N, and Janet B Explicating Fog Computing: Key Research Challenges and Solutions Vipin Singh, John Paul Martin, K. Chandrasekaran, and A Kandasamy Comparison of Various Techniques for Emergency Vehicle Detection using Audio Processing Eshwar Prithvi Jonnadula and Pabitra Mohan Khilar Cryptanalysis of a Robust ECC Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things Diksha Rangwani, Dipanwita Sadhukhan, and Sangram Ray Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment Dipanwita Sadhukhan and Sangram Ray Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber Physical Systems Dr. M. Sangeetha, Mathan Kumar M and Sakthi Kavin S.S. Active Forgery Detection inGrayscale Images using CRC-8based Fragile Watermarking Srilekha Paul and Arup Kumar Pal Android Malware Classification using Ensemble Classifiers Shivi Garg J.C. Bose, and Niyati Baliyan Provably Secure Lightweight Key Policy Attribute Based Encryption for Internet of Things K Sowjanya, and Mou Dasgupta An Improved Two Factor Authentication Scheme for TMIS based on Dual Biometrics Aashish Kumar, Preeti Chandrakar, and Rifaqat Ali Identifying and Mitigating Against XSS Attacks in Web Applications Shashidhara, and R Madhusudhan Statistical Analysis Tests Comparison for DES, AES and Rubik’s Cube Encryption Algorithms Krishna Dharavathu and Dr.M.Satya Anuradha Cloud based Security Analysis in Body Area Network for Health Care Applications Dharmendra Dangi, Dheeraj Dixit and Amit Bhagat Fog Robotics: A New Perspective for Cloud-based Robots Jaykumar Lachure and Rajesh Doriya … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2021
- Extent:
- 1 online resource, illustrations (black and white, and colour)
- Subjects:
- 005.8
Cloud computing -- Security measures
Computer security - Languages:
- English
- ISBNs:
- 9781000357363
9781000357301
9780367821555 - Related ISBNs:
- 9780367407155
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.610225
- Ingest File:
- 04_094.xml