


default search action
Handbook of Computer Networks and Cyber Security, 2020
- Brij B. Gupta
, Gregorio Martínez Pérez, Dharma P. Agrawal, Deepak Gupta:
Handbook of Computer Networks and Cyber Security, Principles and Paradigms. Springer 2020, ISBN 978-3-030-22276-5 - Chaitanya Vemulapalli, Sanjay Kumar Madria, Mark Linderman:
Security Frameworks in Mobile Cloud Computing. 1-41 - Ahmed Manasrah, M. A. Shannaq, Mahmoud Abu Nasir:
An Investigation Study of Privacy Preserving in Cloud Computing Environment. 43-61 - Mouna Jouini, Latifa Ben Arfa Rabai:
Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud Computing Case Study. 63-90 - Dharavath Ramesh, Syam Kumar Pasupuleti:
A Novel AckIBE-Based Secure Cloud Data Management Framework. 91-110 - Kale Rahul Vishwanath, Bharadwaj Veeravalli, Xiaoli Wang:
A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud Platforms. 111-131 - Andrea Vázquez-Ingelmo
, Á. M. Moreno-Montero
, Francisco José García-Peñalvo
:
Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their Countermeasures. 133-172 - Moumita Roy
, Chandreyee Chowdhury, Nauman Aslam:
Security and Privacy Issues in Wireless Sensor and Body Area Networks. 173-200 - Avani Vyas
, Sujata Pal:
Preventing Security and Privacy Attacks in WBANs. 201-225 - Usha Jain
, Muzzammil Hussain:
Underwater Wireless Sensor Networks. 227-245 - Mahendra Kumar Murmu, Awadhesh Kumar Singh:
Security Issues in Cognitive Radio Ad Hoc Networks. 247-264 - Rachna Jain
, Nikita Jain, Anand Nayyar:
Security and Privacy in Social Networks: Data and Structural Anonymity. 265-293 - Neeraj Jain
, Balwinder Raj
:
SOI FinFET for Computer Networks and Cyber Security Systems. 295-311 - Sumit Badotra, Surya Narayan Panda
:
Software-Defined Networking: A Novel Approach to Networks. 313-339 - Arash Shaghaghi, Mohamed Ali Kâafar
, Rajkumar Buyya
, Sanjay Jha
:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. 341-387 - Tushar Ubale, Ankit Kumar Jain:
Survey on DDoS Attack Techniques and Solutions in Software-Defined Network. 389-419 - Prachi Gulihar, Brij B. Gupta
:
Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks. 421-443 - Biswarup Samanta:
Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce Network. 445-459 - Mohammed Saeed Alkatheiri, Abdur Rashid Sangi, Satish Anamalamudi:
Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. 461-473 - Sudesh Rani
, Poonam Saini:
Fog Computing: Applications and Secure Data Aggregation. 475-492 - Bhumika Paharia, Kriti Bhushan:
A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment. 493-524 - Christos Stergiou, Andreas P. Plageras, Konstantinos E. Psannis
, Brij B. Gupta
:
Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network. 525-554 - Richa, Teek Parval Sharma
, Ajay Kumar Sharma:
Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive Study. 555-584 - Mohamed Alloghani, Thar Baker
, Dhiya Al-Jumeily
, Abir Hussain
, Jamila Mustafina
, Ahmed J. Aljaaf:
A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems. 585-608 - Manjunath Kotari
, Niranjan N. Chiplunkar
:
Investigation of Security Issues in Distributed System Monitoring. 609-634 - Aakanksha Tewari, Brij B. Gupta
:
An Analysis of Provable Security Frameworks for RFID Security. 635-651 - Sangeeta Mittal, Shivani Tyagi:
Computational Techniques for Real-Time Credit Card Fraud Detection. 653-681 - Bharat Bhushan
, Gadadhar Sahoo:
Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective. 683-713 - Anil Kumar
, Ravinder Kumar:
Privacy Preservation of Electronic Health Record: Current Status and Future Direction. 715-739 - Hicham Amellal
, Abdelmajid Meslouhi
, Abderahim El Allati
, Anass El Haddadi
:
QKD Protocols Security Between Theory and Engineering Implementation. 741-762 - Priyanka Datta, Shanu Bhardwaj, Surya Narayan Panda
, Sarvesh Tanwar
, Sumit Badotra:
Survey of Security and Privacy Issues on Biometric System. 763-776 - Arpita Sarkar, Binod Kumar Singh
:
A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics. 777-805 - Cyrus F. Nourani:
Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces. 807-823 - Kishore Bhamidipati, Soorya Annadurai
:
Permutation-Substitution Based Image Encryption Algorithms Using Pseudorandom Number Generators. 825-848 - Ravinder Kumar, Hitesh Singh
:
Recent Trends in Text Steganography with Experimental Study. 849-872 - Kishor Kumar Gulla
, P. Viswanath, Suresh Babu Veluru, R. Raja Kumar:
Machine Learning Based Intrusion Detection Techniques. 873-888 - Mouhammd Al-Kasassbeh, Safaa Mohammed, Mohammad Alauthman
, Ammar Almomani
:
Feature Selection Using a Machine Learning to Classify a Malware. 889-904 - R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection. 905-928 - Priyanka Dhaka, Bharti Nagpal:
ABFT: Analytics to Uplift Big Social Events Using Forensic Tools. 929-948 - Palvi Aggarwal
, Cleotilde Gonzalez, Varun Dutt
:
HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory. 949-959

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.