↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Does Query Blocking Improve DNS Privacy?
  3. Altmetric Badge
    Chapter 2 Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks
  4. Altmetric Badge
    Chapter 3 SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN
  5. Altmetric Badge
    Chapter 4 Slowloris DoS Countermeasure over WebSocket
  6. Altmetric Badge
    Chapter 5 Detecting Encrypted Traffic: A Machine Learning Approach
  7. Altmetric Badge
    Chapter 6 Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks
  8. Altmetric Badge
    Chapter 7 A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
  9. Altmetric Badge
    Chapter 8 Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate
  10. Altmetric Badge
    Chapter 9 Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities
  11. Altmetric Badge
    Chapter 10 A Practical Analysis of TLS Vulnerabilities in Korea Web Environment
  12. Altmetric Badge
    Chapter 11 Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
  13. Altmetric Badge
    Chapter 12 Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach
  14. Altmetric Badge
    Chapter 13 Pay as You Want: Bypassing Charging System in Operational Cellular Networks
  15. Altmetric Badge
    Chapter 14 Towards Automated Exploit Generation for Embedded Systems
  16. Altmetric Badge
    Chapter 15 Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares?
  17. Altmetric Badge
    Chapter 16 Development of Information Security Management Assessment Model for the Financial Sector
  18. Altmetric Badge
    Chapter 17 A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness
  19. Altmetric Badge
    Chapter 18 GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects
  20. Altmetric Badge
    Chapter 19 Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18
  21. Altmetric Badge
    Chapter 20 LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)
  22. Altmetric Badge
    Chapter 21 Revocable Group Signatures with Compact Revocation List Using Vector Commitments
  23. Altmetric Badge
    Chapter 22 The Quantum-Safe Revolution
  24. Altmetric Badge
    Chapter 23 New Integral Characteristics of KASUMI Derived by Division Property
  25. Altmetric Badge
    Chapter 24 On Pseudorandomness in Stateless Sources
  26. Altmetric Badge
    Chapter 25 Algebraic Degree Estimation for Integral Attack by Randomized Algorithm
  27. Altmetric Badge
    Chapter 26 Applications of Soft Computing in Cryptology
  28. Altmetric Badge
    Chapter 27 Parallel Implementations of LEA, Revisited
  29. Altmetric Badge
    Chapter 28 Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward
  30. Altmetric Badge
    Chapter 29 A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation
  31. Altmetric Badge
    Chapter 30 Exploration of 3D Texture and Projection for New CAPTCHA Design
  32. Altmetric Badge
    Chapter 31 A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment
  33. Altmetric Badge
    Chapter 32 Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud
  34. Altmetric Badge
    Chapter 33 The Vessel Trajectory Mechanism for Marine Accidents Analysis
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
3 patents
q&a
1 Q&A thread

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
10 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Applications
Published by
Springer, Cham, January 2016
DOI 10.1007/978-3-319-56549-1
ISBNs
978-3-31-956548-4, 978-3-31-956549-1
Editors

Dooho Choi, Sylvain Guilley

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 10 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 10 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 1 10%
Unknown 9 90%
Readers by discipline Count As %
Mathematics 1 10%
Unknown 9 90%