Case studies in secure computing : achievements and trends /
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
Auerbach,
2014.
|
Edición: | 1st. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- <P>Survey of Secure Computing; <EM>Kuruvilla Mathew and Biju Issac<BR></EM>Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection; <EM>Hari Om and Alok Kumar Gupta<BR></EM>Fuzzy Logic-Based Application Security Risk Assessment; <EM>Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya<BR></EM>Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks; <EM>Jayaprakash Kar<BR></EM>Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute Based Access Control; <EM>Jim Longstaff and Tony Howitt<BR></EM>Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments; <EM>Jonny Milliken, Kian Meng Yap, and Alan Marshall<BR></EM>Security Attacks and Countermeasures in Cloud Computing; <EM>Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan<BR></EM>Optimizing Ant-Based Internet Protocol Traceback; <EM>Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi<BR></EM>A Case Study on Security Issues in LT E Backhaul and Core Networks; <EM>Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov<BR></EM>A Case Study of Intelligent ID S False Alarm Reduction in Cloud Environments: Challenges and Trends; <EM>Yuxin Meng, We njuan Li, and Lam-For Kwok<BR></EM>Attacks in Wireless Sensor Networks and Their Countermeasures; <EM>Mukesh Kumar and Kamlesh Dutta<BR></EM>Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; <EM>Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal<BR></EM>The Impact of Application-Layer Denial-of-Service Attacks; <EM>Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani<BR></EM>Classification of Radical Messages on Twitter Using Security Associations; <EM>Pooja Wadhwa and M. P. S. Bhatia<BR></EM>Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the L<I>p </I>Metric; <EM>Renato Cordeirode Amorim and Peter Komisarczuk<BR></EM>Reversible Watermarking: Theory and Practice; <EM>Ruchira Naskar and Rajat Subhra Chakraborty<BR></EM>Web Application Security Attacks and Countermeasures; <EM>Tushar Kanti Saha and A. B. M. Shawkat Ali<BR></EM>Security in Mobile Networks: A Novel Challenge and Solution; <EM>Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz<BR></EM>Web Session Security: Attack and Defense Techniques; <EM>Zachary Evans and Hossain Shahriar<BR></EM>Internet Botnets: A Survey of Detection Techniques; <EM>Boris Nechaev and Andrei Gurtov<BR></EM>Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case Study; <EM>Carlos F. Lerma Reséndez<BR></EM>A Novel Construction of Certificateless Signcryption Scheme for Smart Card; <EM>Jayaprakash Kar</P></EM>