↓ Skip to main content

Security in Computing and Communications

Overview of attention for book
Cover of 'Security in Computing and Communications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Computing Mod with a Variable Lookup Table
  3. Altmetric Badge
    Chapter 2 Mutual Authentication Based on HECC for RFID Implant Systems
  4. Altmetric Badge
    Chapter 3 On the Use of Asynchronous Cellular Automata in Symmetric-Key Cryptography
  5. Altmetric Badge
    Chapter 4 A Random Key Generation Scheme Using Primitive Polynomials over GF(2)
  6. Altmetric Badge
    Chapter 5 Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System
  7. Altmetric Badge
    Chapter 6 Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud
  8. Altmetric Badge
    Chapter 7 Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers
  9. Altmetric Badge
    Chapter 8 A Comparison of Diffusion Properties of Salsa, ChaCha, and MCC Core
  10. Altmetric Badge
    Chapter 9 A Secure Keyword Ordered Multiuser Searchable Encryption Framework
  11. Altmetric Badge
    Chapter 10 Cryptographic Assessment of SSL/TLS Servers Popular in India
  12. Altmetric Badge
    Chapter 11 Key Identifications Using Hebbian Learning
  13. Altmetric Badge
    Chapter 12 An Automated Methodology for Secured User Allocation in Cloud
  14. Altmetric Badge
    Chapter 13 Provenance-Aware NoSQL Databases
  15. Altmetric Badge
    Chapter 14 Efficient Key Management in IoT Using Mobile Aggregator
  16. Altmetric Badge
    Chapter 15 Cloud Resources Optimization for Air Pollution Monitoring Devices and Avoiding Post Pillar Problem
  17. Altmetric Badge
    Chapter 16 Credibility Assessment of Public Pages over Facebook
  18. Altmetric Badge
    Chapter 17 Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment
  19. Altmetric Badge
    Chapter 18 Secure and Privacy Preserving Mobile Healthcare Data Exchange Using Cloud Service
  20. Altmetric Badge
    Chapter 19 Secure Certificateless Signature Scheme with Batch Verification from Bilinear Pairings
  21. Altmetric Badge
    Chapter 20 Security Requirements Elicitation and Modeling Authorizations
  22. Altmetric Badge
    Chapter 21 Two Level Signature Based Authorization Model for Secure Data Warehouse
  23. Altmetric Badge
    Chapter 22 Nonlinear Tracking of Target Submarine Using Extended Kalman Filter (EKF)
  24. Altmetric Badge
    Chapter 23 Tracking Inbound Enemy Missile for Interception from Target Aircraft Using Extended Kalman Filter
  25. Altmetric Badge
    Chapter 24 A Secure One-Time Password Authentication Scheme Using Image Texture Features
  26. Altmetric Badge
    Chapter 25 Analyzing the Applicability of Bitsum Algorithm on LSB Steganography Technique
  27. Altmetric Badge
    Chapter 26 Extreme Learning Machine for Semi-blind Grayscale Image Watermarking in DWT Domain
  28. Altmetric Badge
    Chapter 27 A Passive Blind Approach for Image Splicing Detection Based on DWT and LBP Histograms
  29. Altmetric Badge
    Chapter 28 An Image Forensic Technique for Detection of Copy-Move Forgery in Digital Image
  30. Altmetric Badge
    Chapter 29 Secure Authentication in Online Voting System Using Multiple Image Secret Sharing
  31. Altmetric Badge
    Chapter 30 Touch and Track: An Anti-theft and Data Protection Technique for Smartphones
  32. Altmetric Badge
    Chapter 31 Enhancement of Detecting Wicked Website Through Intelligent Methods
  33. Altmetric Badge
    Chapter 32 Prediction of Malicious Domains Using Smith Waterman Algorithm
  34. Altmetric Badge
    Chapter 33 Outsource-Secured Calculation of Closest Pair of Points
  35. Altmetric Badge
    Chapter 34 Discovering Vulnerable Functions: A Code Similarity Based Approach
  36. Altmetric Badge
    Chapter 35 Performance Analysis of Spectrum Sensing Algorithm Using Multiple Antenna in Cognitive Radio
  37. Altmetric Badge
    Chapter 36 Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced Power
  38. Altmetric Badge
    Chapter 37 Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split
  39. Altmetric Badge
    Chapter 38 MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier
  40. Altmetric Badge
    Chapter 39 SocialBot: Behavioral Analysis and Detection
  41. Altmetric Badge
    Chapter 40 Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications
Attention for Chapter 37: Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split
Altmetric Badge

Citations

dimensions_citation
19 Dimensions

Readers on

mendeley
19 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split
Chapter number 37
Book title
Security in Computing and Communications
Published by
Springer Singapore, September 2016
DOI 10.1007/978-981-10-2738-3_37
Book ISBNs
978-9-81-102737-6, 978-9-81-102738-3
Authors

Shubha Puthran, Ketan Shah

Editors

Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 19 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 19 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 16%
Other 2 11%
Lecturer 2 11%
Student > Bachelor 2 11%
Professor > Associate Professor 2 11%
Other 3 16%
Unknown 5 26%
Readers by discipline Count As %
Computer Science 11 58%
Business, Management and Accounting 1 5%
Social Sciences 1 5%
Engineering 1 5%
Unknown 5 26%