↓ Skip to main content

Computer Network Security

Overview of attention for book
Cover of 'Computer Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Finding Malware on a Web Scale
  3. Altmetric Badge
    Chapter 2 Exposing Security Risks for Commercial Mobile Devices
  4. Altmetric Badge
    Chapter 3 From Qualitative to Quantitative Enforcement of Security Policy
  5. Altmetric Badge
    Chapter 4 Design and Implementation of a Cloud-Based Assured Information Sharing System
  6. Altmetric Badge
    Chapter 5 Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries
  7. Altmetric Badge
    Chapter 6 A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
  8. Altmetric Badge
    Chapter 7 Blind 384-bit Digital Signature Scheme
  9. Altmetric Badge
    Chapter 8 RABAC: Role-Centric Attribute-Based Access Control
  10. Altmetric Badge
    Chapter 9 Trust-Aware RBAC
  11. Altmetric Badge
    Chapter 10 Alternative Mechanisms for Information Security
  12. Altmetric Badge
    Chapter 11 Enforcing Information Flow Policies by a Three-Valued Analysis
  13. Altmetric Badge
    Chapter 12 Towards the Orchestration of Secured Services under Non-disclosure Policies
  14. Altmetric Badge
    Chapter 13 An Approach for Network Information Flow Analysis for Systems of Embedded Components
  15. Altmetric Badge
    Chapter 14 Individual Countermeasure Selection Based on the Return On Response Investment Index
  16. Altmetric Badge
    Chapter 15 Security and Reliability Requirements for Advanced Security Event Management
  17. Altmetric Badge
    Chapter 16 Model-Based Security Event Management
  18. Altmetric Badge
    Chapter 17 Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks
  19. Altmetric Badge
    Chapter 18 Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation
  20. Altmetric Badge
    Chapter 19 Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems
  21. Altmetric Badge
    Chapter 20 Malware Characterization Using Behavioral Components
  22. Altmetric Badge
    Chapter 21 MADAM: A Multi-level Anomaly Detector for Android Malware
  23. Altmetric Badge
    Chapter 22 Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods
  24. Altmetric Badge
    Chapter 23 Configuration-Based Approach to Embedded Device Security
  25. Altmetric Badge
    Chapter 24 A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts
  26. Altmetric Badge
    Chapter 25 Security Modeling of Grid Systems Using Petri Nets
  27. Altmetric Badge
    Chapter 26 Using Graph Theory for Cloud System Security Modeling
Attention for Chapter 16: Model-Based Security Event Management
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Model-Based Security Event Management
Chapter number 16
Book title
Computer Network Security
Published by
Springer, Berlin, Heidelberg, October 2012
DOI 10.1007/978-3-642-33704-8_16
Book ISBNs
978-3-64-233703-1, 978-3-64-233704-8
Authors

Julian Schütte, Roland Rieke, Timo Winkelvos

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 9%
Unknown 10 91%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 36%
Student > Master 3 27%
Other 2 18%
Professor > Associate Professor 1 9%
Unknown 1 9%
Readers by discipline Count As %
Computer Science 9 82%
Engineering 1 9%
Unknown 1 9%