


default search action
Computer and Network Security Essentials, 2018
- Kevin Daimi:

Computer and Network Security Essentials. Springer 2018, ISBN 978-3-319-58423-2
Computer Security
- Jeffrey L. Duffany:

Computer Security. 3-20 - Tarfa Hamed

, Jason B. Ernst, Stefan C. Kremer:
A Survey and Taxonomy of Classifiers of Intrusion Detection Systems. 21-39 - Gregory Vert, Ann Leslie Claesson-Vert, Jesse Roberts, Erica Bott:

A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics. 41-64 - Sally Mosaad, Nashwa Abdelbaki

, Ahmed F. Shosha:
A Postmortem Forensic Analysis for a JavaScript Based Attack. 79-94
Network Security
- Keyur Parmar

, Devesh C. Jinwala
:
Malleable Cryptosystems and Their Applications in Wireless Sensor Networks. 97-111 - Tarfa Hamed

, Jason B. Ernst, Stefan C. Kremer:
A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems. 113-134 - José María de Fuentes

, Luis Hernández Encinas
, Arturo Ribagorda:
Security Protocols for Networks and Internet: A Global Vision. 135-151 - Ahmed Al-Gburi, Abduljaleel Al-Hasnawi

, Leszek Lilien
:
Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls. 153-172 - Xiujuan Du, Meiju Li, Keqin Li:

Reliable Transmission Protocol for Underwater Acoustic Networks. 173-187 - Tyrone S. Toland, Sebastian Kollmannsperger, J. Bernard Brewton, William B. Craft:

Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield. 189-204
Cryptographic Technologies
- Riccardo Focardi

, Flaminia L. Luccio
, Heider A. M. Wahsheh:
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study. 207-219 - Khaled Abdul-Aziz Al-Utaibi, El-Sayed M. El-Alfy

:
Searching Encrypted Data on the Cloud. 221-236 - Sumitra Binu, Mohammed Misbahuddin

, Pethuru Raj:
A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services. 237-261 - Alejandro Sanchez-Gomez, Jesus Diaz, Luis Hernández Encinas

, David Arroyo:
Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers. 263-281 - Victor Gayoso Martínez, Lorena González-Manzano, Agustín Martín Muñoz

:
Secure Elliptic Curves in Cryptography. 283-298 - Ángel Martín del Rey, Alberto Peinado:

Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis. 299-313
Biometrics and Forensics
- Natarajan Meghanathan

:
Biometric Systems for User Authentication. 317-335 - Giovanni Luca Masala

, Pietro Ruiu
, Enrico Grosso:
Biometric Authentication and Data Security in Cloud Computing. 337-353 - Slobodan Petrovic:

Approximate Search in Digital Forensics. 355-367 - Christopher Warren, Eman El-Sheikh, Nhien-An Le-Khac

:
Privacy Preserving Internet Browsers: Forensic Analysis of Browzar. 369-388
Hardware Security
- Mohamed T. Abdelazim, Nashwa Abdelbaki

, Ahmed F. Shosha:
Experimental Digital Forensics of Subscriber Identification Module (SIM) Card. 391-405 - Fathi Amsaad, Nitin Pundir

, Mohammed Y. Niamat:
A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks. 407-425 - Ioannis Papakonstantinou, Nicolas Sklavos

:
Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs. 427-442
Security Applications
- Pascal Birnstill

, Christoph Bier, Paul Georg Wagner
, Jürgen Beyerer:
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking. 445-460 - Elias Bou-Harb

, Claude Fachkha
:
On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns. 461-474 - Natarajan Meghanathan

, Michael Terrell:
Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment. 475-490
Security Management
- Bryson R. Payne

, Tamirat T. Abegaz:
Securing the Internet of Things: Best Practices for Deploying IoT Devices. 493-506 - Sana Siddiqui, Muhammad Salman Khan, Ken Ferens:

Cognitive Computing and Multiscale Analysis for Cyber Security. 507-519 - Jaedeok Kim, Guillermo A. Francia III

:
A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems. 521-538 - Polyxeni Spanaki, Nicolas Sklavos

:
Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts. 539-553 - Jason B. Ernst, Tarfa Hamed

, Stefan C. Kremer
:
A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems. 555-568 - Thiago Gomes Rodrigues, Patricia Takako Endo

, David W. S. C. Beserra, Djamel Sadok, Judith Kelner:
Accountability for Federated Clouds. 569-583 - Muhammad Salman Khan, Sana Siddiqui, Ken Ferens:

A Cognitive and Concurrent Cyber Kill Chain Model. 585-602 - Jibran Saleem, Mohammad Hammoudeh

:
Defense Methods Against Social Engineering Attacks. 603-618

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














