Description |
1 online resource : illustrations (black and white). |
Bibliography |
Includes bibliographical references and index. |
Contents |
<P>Survey of Secure Computing; <EM>Kuruvilla Mathew and Biju Issac<BR></EM>Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection; <EM>Hari Om and Alok Kumar Gupta<BR></EM>Fuzzy Logic-Based Application Security Risk Assessment; <EM>Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya<BR></EM>Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks; <EM>Jayaprakash Kar<BR></EM>Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute Based Access Control; <EM>Jim Longstaff and Tony Howitt<BR></EM>Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments; <EM>Jonny Milliken, Kian Meng Yap, and Alan Marshall<BR></EM>Security Attacks and Countermeasures in Cloud Computing; <EM>Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan<BR></EM>Optimizing Ant-Based Internet Protocol Traceback; <EM>Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi<BR></EM>A Case Study on Security Issues in LT E Backhaul and Core Networks; <EM>Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov<BR></EM>A Case Study of Intelligent ID S False Alarm Reduction in Cloud Environments: Challenges and Trends; <EM>Yuxin Meng, We njuan Li, and Lam-For Kwok<BR></EM>Attacks in Wireless Sensor Networks and Their Countermeasures; <EM>Mukesh Kumar and Kamlesh Dutta<BR></EM>Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; <EM>Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal<BR></EM>The Impact of Application-Layer Denial-of-Service Attacks; <EM>Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani<BR></EM>Classification of Radical Messages on Twitter Using Security Associations; <EM>Pooja Wadhwa and M. P. S. Bhatia<BR></EM>Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the L<I>p </I>Metric; <EM>Renato Cordeirode Amorim and Peter Komisarczuk<BR></EM>Reversible Watermarking: Theory and Practice; <EM>Ruchira Naskar and Rajat Subhra Chakraborty<BR></EM>Web Application Security Attacks and Countermeasures; <EM>Tushar Kanti Saha and A. B. M. Shawkat Ali<BR></EM>Security in Mobile Networks: A Novel Challenge and Solution; <EM>Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz<BR></EM>Web Session Security: Attack and Defense Techniques; <EM>Zachary Evans and Hossain Shahriar<BR></EM>Internet Botnets: A Survey of Detection Techniques; <EM>Boris Nechaev and Andrei Gurtov<BR></EM>Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case Study; <EM>Carlos F. Lerma Reséndez<BR></EM>A Novel Construction of Certificateless Signcryption Scheme for Smart Card; <EM>Jayaprakash Kar</P></EM> |
Subject |
Computer security -- Case studies.
|
|
Computer networks -- Security measures -- Case studies.
|
|
Sécurité informatique -- Études de cas. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Études de cas. |
|
Computer networks -- Security measures. |
|
Computer security. |
Genre |
Case studies.
|
Added Author |
Issac, Biju, editor.
|
|
Israr, Nauman, editor.
|
Other Form: |
Print version: 9781482207064 |
ISBN |
9781482207071 (PDF ebook) : |
|
1482207079 |
|