↓ Skip to main content

Security in Computing and Communications

Overview of attention for book
Cover of 'Security in Computing and Communications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks
  3. Altmetric Badge
    Chapter 2 Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update
  4. Altmetric Badge
    Chapter 3 Survey on Prevention, Mitigation and Containment of Ransomware Attacks
  5. Altmetric Badge
    Chapter 4 Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks
  6. Altmetric Badge
    Chapter 5 Cost Based Model for Secure Health Care Data Retrieval
  7. Altmetric Badge
    Chapter 6 Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments
  8. Altmetric Badge
    Chapter 7 Managing Network Functions in Stateful Application Aware SDN
  9. Altmetric Badge
    Chapter 8 Proof of Stack Consensus for Blockchain Networks
  10. Altmetric Badge
    Chapter 9 Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol
  11. Altmetric Badge
    Chapter 10 Workload Distribution for Supporting Anonymous Communications in Automotive Network
  12. Altmetric Badge
    Chapter 11 Policy-Based Network and Security Management in Federated Service Infrastructures with Permissioned Blockchains
  13. Altmetric Badge
    Chapter 12 Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets
  14. Altmetric Badge
    Chapter 13 A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings
  15. Altmetric Badge
    Chapter 14 Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution
  16. Altmetric Badge
    Chapter 15 Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study
  17. Altmetric Badge
    Chapter 16 BVD - A Blockchain Based Vehicle Database System
  18. Altmetric Badge
    Chapter 17 HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks
  19. Altmetric Badge
    Chapter 18 Security Threats Against LTE Networks: A Survey
  20. Altmetric Badge
    Chapter 19 Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE Hybrid
  21. Altmetric Badge
    Chapter 20 Effective Hardware Trojan Detection Using Front-End Compressive Sensing
  22. Altmetric Badge
    Chapter 21 Enhanced Session Initiation Protocols for Emergency Healthcare Applications
  23. Altmetric Badge
    Chapter 22 Wearable Device Forensic: Probable Case Studies and Proposed Methodology
  24. Altmetric Badge
    Chapter 23 Accessing Data in Healthcare Application
  25. Altmetric Badge
    Chapter 24 Diversity and Progress Controlled Gravitational Search Algorithm for Balancing Load in Cloud
  26. Altmetric Badge
    Chapter 25 On Minimality Attack for Privacy-Preserving Data Publishing
  27. Altmetric Badge
    Chapter 26 Probabilistic Real-Time Intrusion Detection System for Docker Containers
  28. Altmetric Badge
    Chapter 27 Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning
  29. Altmetric Badge
    Chapter 28 Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-Texts
  30. Altmetric Badge
    Chapter 29 SPIC - SRAM PUF Intergrated Chip Based Software Licensing Model
  31. Altmetric Badge
    Chapter 30 DeepMal4J: Java Malware Detection Employing Deep Learning
  32. Altmetric Badge
    Chapter 31 Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis
  33. Altmetric Badge
    Chapter 32 Detection of Suspicious Transactions with Database Forensics and Theory of Evidence
  34. Altmetric Badge
    Chapter 33 KarmaNet: SDN Solution to DNS-Based Denial-of-Service
  35. Altmetric Badge
    Chapter 34 FinSec 3.0: Theory and Practices in Financial Enterprise
  36. Altmetric Badge
    Chapter 35 A TCB Minimizing Model of Computation
  37. Altmetric Badge
    Chapter 36 MedCop: Verifiable Computation for Mobile Healthcare System
  38. Altmetric Badge
    Chapter 37 Key Retrieval from AES Architecture Through Hardware Trojan Horse
  39. Altmetric Badge
    Chapter 38 Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling
  40. Altmetric Badge
    Chapter 39 Overinfection in Ransomware
  41. Altmetric Badge
    Chapter 40 Analysis of Circuits for Security Using Logic Encryption
  42. Altmetric Badge
    Chapter 41 Extensive Simulation Analysis of TCP Variants for Wireless Communication
  43. Altmetric Badge
    Chapter 42 A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation
  44. Altmetric Badge
    Chapter 43 Inverted Index Based Ranked Keyword Search in Multi-user Searchable Encryption
  45. Altmetric Badge
    Chapter 44 A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System
  46. Altmetric Badge
    Chapter 45 A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems
  47. Altmetric Badge
    Chapter 46 Survey of Security Threats in IoT and Emerging Countermeasures
  48. Altmetric Badge
    Chapter 47 Holistic Credit Rating System for Online Microlending Platforms with Blockchain Technology
  49. Altmetric Badge
    Chapter 48 Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment
  50. Altmetric Badge
    Chapter 49 Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoT
  51. Altmetric Badge
    Chapter 50 Algorithmically Generated Domain Detection and Malware Family Classification
  52. Altmetric Badge
    Chapter 51 Transfer Learning Approach for Identification of Malicious Domain Names
  53. Altmetric Badge
    Chapter 52 Behavioral Biometrics and Machine Learning to Secure Website Logins
  54. Altmetric Badge
    Chapter 53 Domain Name Detection and Classification Using Deep Neural Networks
  55. Altmetric Badge
    Chapter 54 Bidirectional LSTM Models for DGA Classification
  56. Altmetric Badge
    Chapter 55 Detecting DGA Using Deep Neural Networks (DNNs)
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
3 X users

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security in Computing and Communications
Published by
Springer Singapore, March 2019
DOI 10.1007/978-981-13-5826-5
ISBNs
978-9-81-135825-8, 978-9-81-135826-5
Editors

Thampi, Sabu M., Madria, Sanjay, Wang, Guojun, Rawat, Danda B., Alcaraz Calero, Jose M.

X Demographics

X Demographics

The data shown below were collected from the profiles of 3 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 1 100%
Readers by discipline Count As %
Computer Science 1 100%