Case studies in secure computing : achievements and trends /
edited by Biju Issac and Nauman Israr.
- 1 online resource
An Auerbach book.
1. Survey of secure computing / Kuruvilla Mathew and Biju Issac -- 2. Feature selection and decision tree : a combinational approach for intrusion detection / Hari Om and Alok Kumar Gupta -- 3. Fuzzy logic-based application security risk assessment / Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya -- 4. Authenticated multiple-key establishment protocol for wireless sensor networks / Jayaprakash Kar -- 5. Tees Confidentiality Model (TCM2) : supporting dynamic authorization and overrides in attribute-based access control / Jim Longstaff and Tony Howitt -- 6. Design and analysis of independent, open-access wi-fi monitoring infrastructures in live environments / Jonny Milliken, Kian Meng Yap, and Alan Marshall -- 7. Security attacks and countermeasures in cloud computing / Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan -- 8. Optimizing ant-based internet protocol traceback / Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi -- 9. A case study on security issues in LTE backhaul and core networks / Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov -- 10. A case study of intelligent IDS false alarm reduction in cloud environments : challenges and trends / Yuxin Meng, Wenjuan Li, and Lam-For Kwok -- 11. Attacks in wireless sensor networks and their countermeasures / Mukesh Kumar and Kamlesh Dutta -- 12. Privacy-preserving identity-based broadcast encryption and its applications / Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal -- 13. The impact of application-layer denial-of-service attacks / Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani -- 14. Classification of radical messages on Twitter using security associations / Pooja Wadhwa and M.P.S. Bhatia -- 15. Toward effective malware clustering : reducing false negatives through feature weighting and the Lp metric / Renato Cordeiro de Amorim and Peter Komisarczuk -- 16. Reversible watermarking : theory and practice / Ruchira Naskar and Rajat Subhra Chakraborty -- 17. Web application security attacks and countermeasures / Tushar Kanti Saha and A.B.M. Shawkat Ali -- 18. Security in mobile networks : a novel challenge and solution / Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz -- 19. Web session security : attack and defense techniques / Zachary Evans and Hossain Shahriar -- 20. Internet botnets : a survey of detection techniques / Boris Nechaev and Andrei Gurtov -- 21. Creating a solid information security infrastructure through the use of the intelligence cycle : a case study / Carlos F. Lerma Resendez -- 22. A novel construction of certificateless signcryption scheme for smart card / Jayaprakash Kar.
9780429090660
10.1201/b17352 doi
Computer security--Case studies.
Computer networks--Security measures--Case studies.
QA76.9.A25 / C426 2015
005.8 / C337
An Auerbach book.
1. Survey of secure computing / Kuruvilla Mathew and Biju Issac -- 2. Feature selection and decision tree : a combinational approach for intrusion detection / Hari Om and Alok Kumar Gupta -- 3. Fuzzy logic-based application security risk assessment / Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya -- 4. Authenticated multiple-key establishment protocol for wireless sensor networks / Jayaprakash Kar -- 5. Tees Confidentiality Model (TCM2) : supporting dynamic authorization and overrides in attribute-based access control / Jim Longstaff and Tony Howitt -- 6. Design and analysis of independent, open-access wi-fi monitoring infrastructures in live environments / Jonny Milliken, Kian Meng Yap, and Alan Marshall -- 7. Security attacks and countermeasures in cloud computing / Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan -- 8. Optimizing ant-based internet protocol traceback / Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi -- 9. A case study on security issues in LTE backhaul and core networks / Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov -- 10. A case study of intelligent IDS false alarm reduction in cloud environments : challenges and trends / Yuxin Meng, Wenjuan Li, and Lam-For Kwok -- 11. Attacks in wireless sensor networks and their countermeasures / Mukesh Kumar and Kamlesh Dutta -- 12. Privacy-preserving identity-based broadcast encryption and its applications / Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal -- 13. The impact of application-layer denial-of-service attacks / Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani -- 14. Classification of radical messages on Twitter using security associations / Pooja Wadhwa and M.P.S. Bhatia -- 15. Toward effective malware clustering : reducing false negatives through feature weighting and the Lp metric / Renato Cordeiro de Amorim and Peter Komisarczuk -- 16. Reversible watermarking : theory and practice / Ruchira Naskar and Rajat Subhra Chakraborty -- 17. Web application security attacks and countermeasures / Tushar Kanti Saha and A.B.M. Shawkat Ali -- 18. Security in mobile networks : a novel challenge and solution / Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz -- 19. Web session security : attack and defense techniques / Zachary Evans and Hossain Shahriar -- 20. Internet botnets : a survey of detection techniques / Boris Nechaev and Andrei Gurtov -- 21. Creating a solid information security infrastructure through the use of the intelligence cycle : a case study / Carlos F. Lerma Resendez -- 22. A novel construction of certificateless signcryption scheme for smart card / Jayaprakash Kar.
9780429090660
10.1201/b17352 doi
Computer security--Case studies.
Computer networks--Security measures--Case studies.
QA76.9.A25 / C426 2015
005.8 / C337