Normal view MARC view ISBD view

Case studies in secure computing : achievements and trends / edited by Biju Issac and Nauman Israr.

Contributor(s): Issac, Biju [editor.] | Israr, Nauman [editor.].
Material type: materialTypeLabelBookPublisher: Boca Raton : Taylor & Francis, CRC Press, [2015]Copyright date: ©2015Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9780429090660.Subject(s): Computer security -- Case studies | Computer networks -- Security measures -- Case studiesAdditional physical formats: Print version: : No titleDDC classification: 005.8 Online resources: Click here to view.
Contents:
1. Survey of secure computing / Kuruvilla Mathew and Biju Issac -- 2. Feature selection and decision tree : a combinational approach for intrusion detection / Hari Om and Alok Kumar Gupta -- 3. Fuzzy logic-based application security risk assessment / Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya -- 4. Authenticated multiple-key establishment protocol for wireless sensor networks / Jayaprakash Kar -- 5. Tees Confidentiality Model (TCM2) : supporting dynamic authorization and overrides in attribute-based access control / Jim Longstaff and Tony Howitt -- 6. Design and analysis of independent, open-access wi-fi monitoring infrastructures in live environments / Jonny Milliken, Kian Meng Yap, and Alan Marshall -- 7. Security attacks and countermeasures in cloud computing / Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan -- 8. Optimizing ant-based internet protocol traceback / Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi -- 9. A case study on security issues in LTE backhaul and core networks / Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov -- 10. A case study of intelligent IDS false alarm reduction in cloud environments : challenges and trends / Yuxin Meng, Wenjuan Li, and Lam-For Kwok -- 11. Attacks in wireless sensor networks and their countermeasures / Mukesh Kumar and Kamlesh Dutta -- 12. Privacy-preserving identity-based broadcast encryption and its applications / Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal -- 13. The impact of application-layer denial-of-service attacks / Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani -- 14. Classification of radical messages on Twitter using security associations / Pooja Wadhwa and M.P.S. Bhatia -- 15. Toward effective malware clustering : reducing false negatives through feature weighting and the Lp metric / Renato Cordeiro de Amorim and Peter Komisarczuk -- 16. Reversible watermarking : theory and practice / Ruchira Naskar and Rajat Subhra Chakraborty -- 17. Web application security attacks and countermeasures / Tushar Kanti Saha and A.B.M. Shawkat Ali -- 18. Security in mobile networks : a novel challenge and solution / Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz -- 19. Web session security : attack and defense techniques / Zachary Evans and Hossain Shahriar -- 20. Internet botnets : a survey of detection techniques / Boris Nechaev and Andrei Gurtov -- 21. Creating a solid information security infrastructure through the use of the intelligence cycle : a case study / Carlos F. Lerma Resendez -- 22. A novel construction of certificateless signcryption scheme for smart card / Jayaprakash Kar.
    average rating: 0.0 (0 votes)
No physical items for this record

An Auerbach book.

1. Survey of secure computing / Kuruvilla Mathew and Biju Issac -- 2. Feature selection and decision tree : a combinational approach for intrusion detection / Hari Om and Alok Kumar Gupta -- 3. Fuzzy logic-based application security risk assessment / Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya -- 4. Authenticated multiple-key establishment protocol for wireless sensor networks / Jayaprakash Kar -- 5. Tees Confidentiality Model (TCM2) : supporting dynamic authorization and overrides in attribute-based access control / Jim Longstaff and Tony Howitt -- 6. Design and analysis of independent, open-access wi-fi monitoring infrastructures in live environments / Jonny Milliken, Kian Meng Yap, and Alan Marshall -- 7. Security attacks and countermeasures in cloud computing / Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan -- 8. Optimizing ant-based internet protocol traceback / Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi -- 9. A case study on security issues in LTE backhaul and core networks / Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov -- 10. A case study of intelligent IDS false alarm reduction in cloud environments : challenges and trends / Yuxin Meng, Wenjuan Li, and Lam-For Kwok -- 11. Attacks in wireless sensor networks and their countermeasures / Mukesh Kumar and Kamlesh Dutta -- 12. Privacy-preserving identity-based broadcast encryption and its applications / Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal -- 13. The impact of application-layer denial-of-service attacks / Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani -- 14. Classification of radical messages on Twitter using security associations / Pooja Wadhwa and M.P.S. Bhatia -- 15. Toward effective malware clustering : reducing false negatives through feature weighting and the Lp metric / Renato Cordeiro de Amorim and Peter Komisarczuk -- 16. Reversible watermarking : theory and practice / Ruchira Naskar and Rajat Subhra Chakraborty -- 17. Web application security attacks and countermeasures / Tushar Kanti Saha and A.B.M. Shawkat Ali -- 18. Security in mobile networks : a novel challenge and solution / Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz -- 19. Web session security : attack and defense techniques / Zachary Evans and Hossain Shahriar -- 20. Internet botnets : a survey of detection techniques / Boris Nechaev and Andrei Gurtov -- 21. Creating a solid information security infrastructure through the use of the intelligence cycle : a case study / Carlos F. Lerma Resendez -- 22. A novel construction of certificateless signcryption scheme for smart card / Jayaprakash Kar.

There are no comments for this item.

Log in to your account to post a comment.