Buch, Englisch, 694 Seiten, Format (B × H): 255 mm x 178 mm, Gewicht: 1446 g
Reihe: Security, Privacy, and Trust in Mobile Communications
Principles, Algorithm, Applications, and Perspectives
Buch, Englisch, 694 Seiten, Format (B × H): 255 mm x 178 mm, Gewicht: 1446 g
Reihe: Security, Privacy, and Trust in Mobile Communications
ISBN: 978-0-367-65691-1
Verlag: Taylor & Francis Ltd
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Betriebssysteme
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management Produktionsmanagement, Qualitätskontrolle
Weitere Infos & Material
1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse. 5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6 Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETs. 8 Security in Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection Techniques: A Review. 10 Overview of Smartphone Security: Attack and Defense Techniques. 11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues. 12 Medical Image Enhancement Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes. 21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures. 22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective. 23 A Compendium of Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime.