Extent: | 1 Online-Ressource (589 Seiten) |
---|---|
Series: | |
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | Includes bibliographical references and index Restricted to subscribers or individual electronic text purchasers Mode of access: World Wide Web Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal -- Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai Also available in print. |
ISBN: | 978-1-5225-0106-0 ; 978-1-5225-0105-3 ; 1-5225-0105-3 |
Other identifiers: | 10.4018/978-1-5225-0105-3 [DOI] |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10011728486