↓ Skip to main content

Security and Privacy in Communication Networks

Overview of attention for book
Cover of 'Security and Privacy in Communication Networks'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 FineDroid: Enforcing Permissions with System-Wide Application Execution Context
  3. Altmetric Badge
    Chapter 2 Detection, Classification and Characterization of Android Malware Using API Data Dependency
  4. Altmetric Badge
    Chapter 3 KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices
  5. Altmetric Badge
    Chapter 4 Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps
  6. Altmetric Badge
    Chapter 5 SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications
  7. Altmetric Badge
    Chapter 6 Intrinsic Code Attestation by Instruction Chaining for Embedded Devices
  8. Altmetric Badge
    Chapter 7 Defeating Kernel Driver Purifier
  9. Altmetric Badge
    Chapter 8 Kernel Data Attack Is a Realistic Security Threat
  10. Altmetric Badge
    Chapter 9 RScam: Cloud-Based Anti-Malware via Reversible Sketch
  11. Altmetric Badge
    Chapter 10 TADOOP: Mining Network Traffic Anomalies with Hadoop
  12. Altmetric Badge
    Chapter 11 SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services
  13. Altmetric Badge
    Chapter 12 Authenticating Top- k Results of Secure Multi-keyword Search in Cloud Computing
  14. Altmetric Badge
    Chapter 13 Resource Efficient Privacy Preservation of Online Social Media Conversations
  15. Altmetric Badge
    Chapter 14 Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android
  16. Altmetric Badge
    Chapter 15 Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems
  17. Altmetric Badge
    Chapter 16 Remote Activation of Hardware Trojans via a Covert Temperature Channel
  18. Altmetric Badge
    Chapter 17 Route Leaks Identification by Detecting Routing Loops
  19. Altmetric Badge
    Chapter 18 Pulsar : Stateful Black-Box Fuzzing of Proprietary Network Protocols
  20. Altmetric Badge
    Chapter 19 You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic
  21. Altmetric Badge
    Chapter 20 Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing
  22. Altmetric Badge
    Chapter 21 An Improved Method for Anomaly-Based Network Scan Detection
  23. Altmetric Badge
    Chapter 22 Why Web Servers Should Fear Their Clients
  24. Altmetric Badge
    Chapter 23 An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications
  25. Altmetric Badge
    Chapter 24 Generation of Transmission Control Rules Compliant with Existing Access Control Policies
  26. Altmetric Badge
    Chapter 25 A Markov Random Field Approach to Automated Protocol Signature Inference
  27. Altmetric Badge
    Chapter 26 How to Prevent to Delegate Authentication
  28. Altmetric Badge
    Chapter 27 Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability
  29. Altmetric Badge
    Chapter 28 A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers
  30. Altmetric Badge
    Chapter 29 Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks
  31. Altmetric Badge
    Chapter 30 POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware
  32. Altmetric Badge
    Chapter 31 POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure
  33. Altmetric Badge
    Chapter 32 POSTER: A Security Adaptive Steganography System Applied on Digital Audio
  34. Altmetric Badge
    Chapter 33 POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths
  35. Altmetric Badge
    Chapter 34 POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial Networks
  36. Altmetric Badge
    Chapter 35 POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems
  37. Altmetric Badge
    Chapter 36 POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts
  38. Altmetric Badge
    Chapter 37 POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET
  39. Altmetric Badge
    Chapter 38 POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection
  40. Altmetric Badge
    Chapter 39 POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis
  41. Altmetric Badge
    Chapter 40 Securing Application with Software Partitioning: A Case Study Using SGX
  42. Altmetric Badge
    Chapter 41 Image Spam Classification Using Neural Network
  43. Altmetric Badge
    Chapter 42 An Effective t-way Test Data Generation Strategy
  44. Altmetric Badge
    Chapter 43 A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering
  45. Altmetric Badge
    Chapter 44 Community-Based Collaborative Intrusion Detection
  46. Altmetric Badge
    Chapter 45 A Novel Clustering Algorithm for Database Anomaly Detection
  47. Altmetric Badge
    Chapter 46 Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks
  48. Altmetric Badge
    Chapter 47 Human Surveillance System for Security Application
  49. Altmetric Badge
    Chapter 48 Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
4 X users

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
61 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security and Privacy in Communication Networks
Published by
Springer International Publishing, January 2015
DOI 10.1007/978-3-319-28865-9
ISBNs
978-3-31-928864-2, 978-3-31-928865-9
Authors

Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran

Editors

Thuraisingham, Bhavani, Wang, XiaoFeng, Yegneswaran, Vinod

X Demographics

X Demographics

The data shown below were collected from the profiles of 4 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 61 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 61 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 12 20%
Student > Master 11 18%
Student > Bachelor 6 10%
Researcher 5 8%
Student > Doctoral Student 3 5%
Other 9 15%
Unknown 15 25%
Readers by discipline Count As %
Computer Science 33 54%
Engineering 9 15%
Social Sciences 3 5%
Psychology 1 2%
Unknown 15 25%