Case studies in secure computing achievements and trends
In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines th...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton :
Taylor & Francis, CRC Press
[2015]
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009634673106719 |
Tabla de Contenidos:
- Front Cover; Contents; Preface; Editors; Contributors; Chapter 1: Survey of Secure Computing; Chapter 2: Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection; Chapter 3: Fuzzy Logic-Based Application Security Risk Assessment; Chapter 4: Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks; Chapter 5: Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute-Based Access Control; Chapter 6: Design and Analysis of Independent, Open- Access Wi-Fi Monitoring Infrastructures in Live Environments
- Chapter 7: Security Attacks and Countermeasures in Cloud ComputingChapter 8: Optimizing Ant-Based Internet Protocol Traceback; Chapter 9: A Case Study on Security Issues in LTE Backhaul and Core Networks; Chapter 10: A Case Study of Intelligent IDS False Alarm Reduction in Cloud Environments: Challenges and Trends; Chapter 11: Attacks in Wireless Sensor Networks and Their Countermeasures; Chapter 12: Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; Chapter 13: The Impact of Application-Layer Denial-of- Service Attacks
- Chapter 14: Classification of Radical Messages on Twitter Using Security AssociationsChapter 15: Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric; Chapter 16: Reversible Watermarking: Theory and Practice; Chapter 17: Web Application Security Attacks and Countermeasures; Chapter 18: Security in Mobile Networks: A Novel Challenge and Solution; Chapter 19: Web Session Security: Attack and Defense Techniques; Chapter 20: Internet Botnets: A Survey of Detection Techniques
- Chapter 21: Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case StudyChapter 22: A Novel Construction of Certificateless Signcryption Scheme for Smart Card; Back Cover