Case studies in secure computing achievements and trends

In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines th...

Descripción completa

Detalles Bibliográficos
Otros Autores: Issac, Biju, editor (editor), Israr, Nauman, editor
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton : Taylor & Francis, CRC Press [2015]
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009634673106719
Tabla de Contenidos:
  • Front Cover; Contents; Preface; Editors; Contributors; Chapter 1: Survey of Secure Computing; Chapter 2: Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection; Chapter 3: Fuzzy Logic-Based Application Security Risk Assessment; Chapter 4: Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks; Chapter 5: Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute-Based Access Control; Chapter 6: Design and Analysis of Independent, Open- Access Wi-Fi Monitoring Infrastructures in Live Environments
  • Chapter 7: Security Attacks and Countermeasures in Cloud ComputingChapter 8: Optimizing Ant-Based Internet Protocol Traceback; Chapter 9: A Case Study on Security Issues in LTE Backhaul and Core Networks; Chapter 10: A Case Study of Intelligent IDS False Alarm Reduction in Cloud Environments: Challenges and Trends; Chapter 11: Attacks in Wireless Sensor Networks and Their Countermeasures; Chapter 12: Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; Chapter 13: The Impact of Application-Layer Denial-of- Service Attacks
  • Chapter 14: Classification of Radical Messages on Twitter Using Security AssociationsChapter 15: Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric; Chapter 16: Reversible Watermarking: Theory and Practice; Chapter 17: Web Application Security Attacks and Countermeasures; Chapter 18: Security in Mobile Networks: A Novel Challenge and Solution; Chapter 19: Web Session Security: Attack and Defense Techniques; Chapter 20: Internet Botnets: A Survey of Detection Techniques
  • Chapter 21: Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case StudyChapter 22: A Novel Construction of Certificateless Signcryption Scheme for Smart Card; Back Cover