default search action
Handbook of Computer Networks and Cyber Security, 2020
- Brij B. Gupta, Gregorio Martínez Pérez, Dharma P. Agrawal, Deepak Gupta:
Handbook of Computer Networks and Cyber Security, Principles and Paradigms. Springer 2020, ISBN 978-3-030-22276-5 - Chaitanya Vemulapalli, Sanjay Kumar Madria, Mark Linderman:
Security Frameworks in Mobile Cloud Computing. 1-41 - Ahmed M. Manasrah, M. A. Shannaq, Mahmoud Abu Nasir:
An Investigation Study of Privacy Preserving in Cloud Computing Environment. 43-61 - Mouna Jouini, Latifa Ben Arfa Rabai:
Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud Computing Case Study. 63-90 - Dharavath Ramesh, Syam Kumar Pasupuleti:
A Novel AckIBE-Based Secure Cloud Data Management Framework. 91-110 - Kale Rahul Vishwanath, Bharadwaj Veeravalli, Xiaoli Wang:
A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud Platforms. 111-131 - Andrea Vázquez-Ingelmo, Á. M. Moreno-Montero, Francisco José García-Peñalvo:
Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their Countermeasures. 133-172 - Moumita Roy, Chandreyee Chowdhury, Nauman Aslam:
Security and Privacy Issues in Wireless Sensor and Body Area Networks. 173-200 - Avani Vyas, Sujata Pal:
Preventing Security and Privacy Attacks in WBANs. 201-225 - Usha Jain, Muzzammil Hussain:
Underwater Wireless Sensor Networks. 227-245 - Mahendra Kumar Murmu, Awadhesh Kumar Singh:
Security Issues in Cognitive Radio Ad Hoc Networks. 247-264 - Rachna Jain, Nikita Jain, Anand Nayyar:
Security and Privacy in Social Networks: Data and Structural Anonymity. 265-293 - Neeraj Jain, Balwinder Raj:
SOI FinFET for Computer Networks and Cyber Security Systems. 295-311 - Sumit Badotra, Surya Narayan Panda:
Software-Defined Networking: A Novel Approach to Networks. 313-339 - Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. 341-387 - Tushar Ubale, Ankit Kumar Jain:
Survey on DDoS Attack Techniques and Solutions in Software-Defined Network. 389-419 - Prachi Gulihar, Brij B. Gupta:
Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks. 421-443 - Biswarup Samanta:
Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce Network. 445-459 - Mohammed Saeed Alkatheiri, Abdur Rashid Sangi, Satish Anamalamudi:
Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. 461-473 - Sudesh Rani, Poonam Saini:
Fog Computing: Applications and Secure Data Aggregation. 475-492 - Bhumika Paharia, Kriti Bhushan:
A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment. 493-524 - Christos Stergiou, Andreas P. Plageras, Konstantinos E. Psannis, Brij B. Gupta:
Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network. 525-554 - Richa, Teek Parval Sharma, Ajay Kumar Sharma:
Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive Study. 555-584 - Mohamed Alloghani, Thar Baker, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Ahmed J. Aljaaf:
A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems. 585-608 - Manjunath Kotari, Niranjan N. Chiplunkar:
Investigation of Security Issues in Distributed System Monitoring. 609-634 - Aakanksha Tewari, Brij B. Gupta:
An Analysis of Provable Security Frameworks for RFID Security. 635-651 - Sangeeta Mittal, Shivani Tyagi:
Computational Techniques for Real-Time Credit Card Fraud Detection. 653-681 - Bharat Bhushan, Gadadhar Sahoo:
Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective. 683-713 - Anil Kumar, Ravinder Kumar:
Privacy Preservation of Electronic Health Record: Current Status and Future Direction. 715-739 - Hicham Amellal, Abdelmajid Meslouhi, Abderahim El Allati, Anass El Haddadi:
QKD Protocols Security Between Theory and Engineering Implementation. 741-762 - Priyanka Datta, Shanu Bhardwaj, Surya Narayan Panda, Sarvesh Tanwar, Sumit Badotra:
Survey of Security and Privacy Issues on Biometric System. 763-776 - Arpita Sarkar, Binod Kumar Singh:
A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics. 777-805 - Cyrus F. Nourani:
Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces. 807-823 - Kishore Bhamidipati, Soorya Annadurai:
Permutation-Substitution Based Image Encryption Algorithms Using Pseudorandom Number Generators. 825-848 - Ravinder Kumar, Hitesh Singh:
Recent Trends in Text Steganography with Experimental Study. 849-872 - Kishor Kumar Gulla, P. Viswanath, Suresh Babu Veluru, R. Raja Kumar:
Machine Learning Based Intrusion Detection Techniques. 873-888 - Mouhammd Al-Kasassbeh, Safaa Mohammed, Mohammad Alauthman, Ammar Almomani:
Feature Selection Using a Machine Learning to Classify a Malware. 889-904 - R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection. 905-928 - Priyanka Dhaka, Bharti Nagpal:
ABFT: Analytics to Uplift Big Social Events Using Forensic Tools. 929-948 - Palvi Aggarwal, Cleotilde Gonzalez, Varun Dutt:
HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory. 949-959
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.