Daimi, Kevin

Computer and Network Security Essentials

Daimi, Kevin - Computer and Network Security Essentials, ebook


Ebook, PDF with Adobe DRM
ISBN: 9783319584249
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. Computer Security

1. Computer Security
Jeffrey L. Duffany

2. A Survey and Taxonomy of Classifiers of Intrusion Detection Systems
Tarfa Hamed, Jason B. Ernst, Stefan C. Kremer

3. A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics
Gregory Vert, Ann Leslie Claesson-Vert, Jesse Roberts, Erica Bott

4. Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining
Nirali R. Nanavati, Devesh C. Jinwala

5. A Postmortem Forensic Analysis for a JavaScript Based Attack
Sally Mosaad, Nashwa Abdelbaki, Ahmed F. Shosha

Part II. Network Security

6. Malleable Cryptosystems and Their Applications in Wireless Sensor Networks
Keyur Parmar, Devesh C. Jinwala

7. A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems
Tarfa Hamed, Jason B. Ernst, Stefan C. Kremer

8. Security Protocols for Networks and Internet: A Global Vision
José María de Fuentes, Luis Hernandez-Encinas, Arturo Ribagorda

9. Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls
A. Al-Gburi, A. Al-Hasnawi, L. Lilien

10. Reliable Transmission Protocol for Underwater Acoustic Networks
Xiujuan Du, Meiju Li, Keqin Li

11. Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield
Tyrone S. Toland, Sebastian Kollmannsperger, J. Bernard Brewton, William B. Craft

Part III. Cryptographic Technologies

12. Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study
Riccardo Focardi, Flaminia L. Luccio, Heider A. M. Wahsheh

13. Searching Encrypted Data on the Cloud
Khaled A. Al-Utaibi, El-Sayed M. El-Alfy

14. A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services
Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj

15. Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers
Alejandro Sanchez-Gomez, Jesus Diaz, Luis Hernandez-Encinas, David Arroyo

16. Secure Elliptic Curves in Cryptography
Victor Gayoso Martínez, Lorena González-Manzano, Agustín Martín Muñoz

17. Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis
A. Martín Rey, A. Peinado

Part IV. Biometrics and Forensics

18. Biometric Systems for User Authentication
Natarajan Meghanathan

19. Biometric Authentication and Data Security in Cloud Computing
Giovanni L. Masala, Pietro Ruiu, Enrico Grosso

20. Approximate Search in Digital Forensics
Slobodan Petrović

21. Privacy Preserving Internet Browsers: Forensic Analysis of Browzar
Christopher Warren, Eman El-Sheikh, Nhien-An Le-Khac

Part V. Hardware Security

22. Experimental Digital Forensics of Subscriber Identification Module (SIM) Card
Mohamed T. Abdelazim, Nashwa Abdelbaki, Ahmed F. Shosha

23. A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks
Fathi Amsaad, Nitin Pundir, Mohammed Niamat

24. Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs
Ioannis Papakonstantinou, Nicolas Sklavos

Part VI. Security Applications

25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
Pascal Birnstill, Christoph Bier, Paul Wagner, Jürgen Beyerer

26. On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns
Elias Bou-Harb, Claude Fachkha

27. Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment
Natarajan Meghanathan, Michael Terrell

Part VII. Security Management

28. Securing the Internet of Things: Best Practices for Deploying IoT Devices
Bryson R. Payne, Tamirat T. Abegaz

29. Cognitive Computing and Multiscale Analysis for Cyber Security
Sana Siddiqui, Muhammad Salman Khan, Ken Ferens

30. A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems
Jaedeok Kim, Guillermo Francia

31. Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts
Polyxeni Spanaki, Nicolas Sklavos

32. A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems
Jason Ernst, Tarfa Hamed, Stefan Kremer

33. Accountability for Federated Clouds
Thiago Gomes Rodrigues, Patricia Takako Endo, David W. S. C. Beserra, Djamel Sadok, Judith Kelner

34. A Cognitive and Concurrent Cyber Kill Chain Model
Muhammad Salman Khan, Sana Siddiqui, Ken Ferens

35. Defense Methods Against Social Engineering Attacks
Jibran Saleem, Mohammad Hammoudeh

Keywords: Engineering, Communications Engineering, Networks, Computer Communication Networks, System Performance and Evaluation, Systems and Data Security

Publication year
Page amount
15 pages
Technology, Energy, Traffic
Printed ISBN

Similar titles