↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 ADAM: Automated Detection and Attribution of Malicious Webpages
  3. Altmetric Badge
    Chapter 2 Detection of Heap-Spraying Attacks Using String Trace Graph
  4. Altmetric Badge
    Chapter 3 A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin
  5. Altmetric Badge
    Chapter 4 Before Unrooting your Android Phone, Patching up Permission System First!
  6. Altmetric Badge
    Chapter 5 I’ve Got Your Number:
  7. Altmetric Badge
    Chapter 6 Analyzing Unnecessary Permissions Requested by Android Apps Based on Users’ Opinions
  8. Altmetric Badge
    Chapter 7 Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage
  9. Altmetric Badge
    Chapter 8 Analyzing Security of Korean USIM-Based PKI Certificate Service
  10. Altmetric Badge
    Chapter 9 AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification
  11. Altmetric Badge
    Chapter 10 Systematically Breaking Online WYSIWYG Editors
  12. Altmetric Badge
    Chapter 11 New Integrated Long-Term Glimpse of RC4
  13. Altmetric Badge
    Chapter 12 Improved Modular Multiplication for Optimal Prime Fields
  14. Altmetric Badge
    Chapter 13 Context Based Smart Access Control on BYOD Environments
  15. Altmetric Badge
    Chapter 14 Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing
  16. Altmetric Badge
    Chapter 15 SecaaS Framework and Architecture: A Design of Dynamic Packet Control
  17. Altmetric Badge
    Chapter 16 Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction
  18. Altmetric Badge
    Chapter 17 A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks
  19. Altmetric Badge
    Chapter 18 Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing Property
  20. Altmetric Badge
    Chapter 19 Fair Multi-signature
  21. Altmetric Badge
    Chapter 20 An Efficient Variant of Boneh-Gentry-Hamburg’s Identity-Based Encryption Without Pairing
  22. Altmetric Badge
    Chapter 21 Joint Signature and Encryption in the Presence of Continual Leakage
  23. Altmetric Badge
    Chapter 22 Wireless Key Exchange Using Frequency Impairments
  24. Altmetric Badge
    Chapter 23 Exploiting the Potential of GPUs for Modular Multiplication in ECC
  25. Altmetric Badge
    Chapter 24 The Unified Hardware Design for GCM and SGCM
  26. Altmetric Badge
    Chapter 25 Successful Profiling Attacks with Different Measurement Environments for Each Phase
  27. Altmetric Badge
    Chapter 26 Function Masking: A New Countermeasure Against Side Channel Attack
  28. Altmetric Badge
    Chapter 27 Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System
  29. Altmetric Badge
    Chapter 28 Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network
  30. Altmetric Badge
    Chapter 29 Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis
  31. Altmetric Badge
    Chapter 30 Advanced Security Assessment for Control Effectiveness
  32. Altmetric Badge
    Chapter 31 Study on the Effectiveness of the Security Countermeasures Against Spear Phishing
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (82nd percentile)
  • Good Attention Score compared to outputs of the same age and source (75th percentile)

Mentioned by

twitter
1 X user
patent
3 patents

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
25 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Applications
Published by
Lecture notes in computer science, January 2014
DOI 10.1007/978-3-319-15087-1
ISBNs
978-3-31-915086-4, 978-3-31-915087-1
Editors

Kyung-Hyune Rhee, Jeong Hyun Yi

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 25 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 25 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 5 20%
Student > Bachelor 4 16%
Researcher 4 16%
Student > Ph. D. Student 4 16%
Other 2 8%
Other 4 16%
Unknown 2 8%
Readers by discipline Count As %
Computer Science 16 64%
Engineering 2 8%
Business, Management and Accounting 1 4%
Unspecified 1 4%
Social Sciences 1 4%
Other 1 4%
Unknown 3 12%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 7. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 19 December 2017.
All research outputs
#4,211,224
of 22,965,074 outputs
Outputs from Lecture notes in computer science
#989
of 8,137 outputs
Outputs of similar age
#50,276
of 306,443 outputs
Outputs of similar age from Lecture notes in computer science
#52
of 280 outputs
Altmetric has tracked 22,965,074 research outputs across all sources so far. Compared to these this one has done well and is in the 80th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,137 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done well, scoring higher than 82% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 306,443 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 82% of its contemporaries.
We're also able to compare this research output to 280 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 75% of its contemporaries.