Daimi, Kevin
Computer and Network Security Essentials
Part I. Computer Security
1. Computer Security
Jeffrey L. Duffany
2. A Survey and Taxonomy of Classifiers of Intrusion Detection Systems
Tarfa Hamed, Jason B. Ernst, Stefan C. Kremer
3. A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics
Gregory Vert, Ann Leslie Claesson-Vert, Jesse Roberts, Erica Bott
4. Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining
Nirali R. Nanavati, Devesh C. Jinwala
5. A Postmortem Forensic Analysis for a JavaScript Based Attack
Sally Mosaad, Nashwa Abdelbaki, Ahmed F. Shosha
Part II. Network Security
6. Malleable Cryptosystems and Their Applications in Wireless Sensor Networks
Keyur Parmar, Devesh C. Jinwala
7. A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems
Tarfa Hamed, Jason B. Ernst, Stefan C. Kremer
8. Security Protocols for Networks and Internet: A Global Vision
José María de Fuentes, Luis Hernandez-Encinas, Arturo Ribagorda
9. Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls
A. Al-Gburi, A. Al-Hasnawi, L. Lilien
10. Reliable Transmission Protocol for Underwater Acoustic Networks
Xiujuan Du, Meiju Li, Keqin Li
11. Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield
Tyrone S. Toland, Sebastian Kollmannsperger, J. Bernard Brewton, William B. Craft
Part III. Cryptographic Technologies
12. Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study
Riccardo Focardi, Flaminia L. Luccio, Heider A. M. Wahsheh
13. Searching Encrypted Data on the Cloud
Khaled A. Al-Utaibi, El-Sayed M. El-Alfy
14. A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services
Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj
15. Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers
Alejandro Sanchez-Gomez, Jesus Diaz, Luis Hernandez-Encinas, David Arroyo
16. Secure Elliptic Curves in Cryptography
Victor Gayoso Martínez, Lorena González-Manzano, Agustín Martín Muñoz
17. Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis
A. Martín Rey, A. Peinado
Part IV. Biometrics and Forensics
18. Biometric Systems for User Authentication
Natarajan Meghanathan
19. Biometric Authentication and Data Security in Cloud Computing
Giovanni L. Masala, Pietro Ruiu, Enrico Grosso
20. Approximate Search in Digital Forensics
Slobodan Petrović
21. Privacy Preserving Internet Browsers: Forensic Analysis of Browzar
Christopher Warren, Eman El-Sheikh, Nhien-An Le-Khac
Part V. Hardware Security
22. Experimental Digital Forensics of Subscriber Identification Module (SIM) Card
Mohamed T. Abdelazim, Nashwa Abdelbaki, Ahmed F. Shosha
23. A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks
Fathi Amsaad, Nitin Pundir, Mohammed Niamat
24. Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs
Ioannis Papakonstantinou, Nicolas Sklavos
Part VI. Security Applications
25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
Pascal Birnstill, Christoph Bier, Paul Wagner, Jürgen Beyerer
26. On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns
Elias Bou-Harb, Claude Fachkha
27. Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment
Natarajan Meghanathan, Michael Terrell
Part VII. Security Management
28. Securing the Internet of Things: Best Practices for Deploying IoT Devices
Bryson R. Payne, Tamirat T. Abegaz
29. Cognitive Computing and Multiscale Analysis for Cyber Security
Sana Siddiqui, Muhammad Salman Khan, Ken Ferens
30. A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems
Jaedeok Kim, Guillermo Francia
31. Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts
Polyxeni Spanaki, Nicolas Sklavos
32. A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems
Jason Ernst, Tarfa Hamed, Stefan Kremer
33. Accountability for Federated Clouds
Thiago Gomes Rodrigues, Patricia Takako Endo, David W. S. C. Beserra, Djamel Sadok, Judith Kelner
34. A Cognitive and Concurrent Cyber Kill Chain Model
Muhammad Salman Khan, Sana Siddiqui, Ken Ferens
35. Defense Methods Against Social Engineering Attacks
Jibran Saleem, Mohammad Hammoudeh
Keywords: Engineering, Communications Engineering, Networks, Computer Communication Networks, System Performance and Evaluation, Systems and Data Security
- Editor
- Daimi, Kevin
- Publisher
- Springer
- Publication year
- 2018
- Language
- en
- Edition
- 1
- Page amount
- 15 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9783319584249
- Printed ISBN
- 978-3-319-58423-2