Pub Date : 2017-10-26DOI: 10.1007/978-3-319-58424-9_21
Christopher Warren, E. El-Sheikh, Nhien-An Le-Khac
{"title":"Privacy Preserving Internet Browsers: Forensic Analysis of Browzar","authors":"Christopher Warren, E. El-Sheikh, Nhien-An Le-Khac","doi":"10.1007/978-3-319-58424-9_21","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_21","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127726762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-31DOI: 10.1007/978-3-319-58424-9_18
N. Meghanathan
{"title":"Biometric Systems for User Authentication","authors":"N. Meghanathan","doi":"10.1007/978-3-319-58424-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_18","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130856398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_2
Tarfa Hamed, Jason B. Ernst, S. C. Kremer
{"title":"A Survey and Taxonomy of Classifiers of Intrusion Detection Systems","authors":"Tarfa Hamed, Jason B. Ernst, S. C. Kremer","doi":"10.1007/978-3-319-58424-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_2","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130509890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_29
S. Siddiqui, Muhammad Salman Khan, K. Ferens
{"title":"Cognitive Computing and Multiscale Analysis for Cyber Security","authors":"S. Siddiqui, Muhammad Salman Khan, K. Ferens","doi":"10.1007/978-3-319-58424-9_29","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_29","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_20
Slobodan V. Petrovic
{"title":"Approximate Search in Digital Forensics","authors":"Slobodan V. Petrovic","doi":"10.1007/978-3-319-58424-9_20","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_20","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_12
R. Focardi, F. Luccio, H. Wahsheh
{"title":"Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study","authors":"R. Focardi, F. Luccio, H. Wahsheh","doi":"10.1007/978-3-319-58424-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_12","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123648773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_16
V. G. Martínez, L. González-Manzano, A. M. Muñoz
{"title":"Secure Elliptic Curves in Cryptography","authors":"V. G. Martínez, L. González-Manzano, A. M. Muñoz","doi":"10.1007/978-3-319-58424-9_16","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_16","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126136939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_31
Polyxeni Spanaki, N. Sklavos
{"title":"Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts","authors":"Polyxeni Spanaki, N. Sklavos","doi":"10.1007/978-3-319-58424-9_31","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_31","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116016913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_17
Á. M. D. Rey, A. Peinado
{"title":"Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis","authors":"Á. M. D. Rey, A. Peinado","doi":"10.1007/978-3-319-58424-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_17","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127528100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}