Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_33
Thiago Rodrigues, P. Endo, D. Beserra, D. Sadok, J. Kelner
{"title":"Accountability for Federated Clouds","authors":"Thiago Rodrigues, P. Endo, D. Beserra, D. Sadok, J. Kelner","doi":"10.1007/978-3-319-58424-9_33","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_33","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_6
Keyur Parmar, D. Jinwala
{"title":"Malleable Cryptosystems and Their Applications in Wireless Sensor Networks","authors":"Keyur Parmar, D. Jinwala","doi":"10.1007/978-3-319-58424-9_6","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_6","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_8
J. M. D. Fuentes, L. H. Encinas, A. Ribagorda
{"title":"Security Protocols for Networks and Internet: A Global Vision","authors":"J. M. D. Fuentes, L. H. Encinas, A. Ribagorda","doi":"10.1007/978-3-319-58424-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_8","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126833523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_32
Jason B. Ernst, Tarfa Hamed, S. C. Kremer
{"title":"A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems","authors":"Jason B. Ernst, Tarfa Hamed, S. C. Kremer","doi":"10.1007/978-3-319-58424-9_32","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_32","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123815099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_34
Muhammad Salman Khan, S. Siddiqui, K. Ferens
{"title":"A Cognitive and Concurrent Cyber Kill Chain Model","authors":"Muhammad Salman Khan, S. Siddiqui, K. Ferens","doi":"10.1007/978-3-319-58424-9_34","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_34","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125870401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_4
Nirali R. Nanavati, D. Jinwala
{"title":"Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining","authors":"Nirali R. Nanavati, D. Jinwala","doi":"10.1007/978-3-319-58424-9_4","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_4","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_7
Tarfa Hamed, Jason B. Ernst, S. C. Kremer
{"title":"A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems","authors":"Tarfa Hamed, Jason B. Ernst, S. C. Kremer","doi":"10.1007/978-3-319-58424-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_7","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"45 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113943963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_14
S. Binu, M. Misbahuddin, P. Raj
{"title":"A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services","authors":"S. Binu, M. Misbahuddin, P. Raj","doi":"10.1007/978-3-319-58424-9_14","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_14","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_19
G. Masala, P. Ruiu, E. Grosso
{"title":"Biometric Authentication and Data Security in Cloud Computing","authors":"G. Masala, P. Ruiu, E. Grosso","doi":"10.1007/978-3-319-58424-9_19","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_19","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-58424-9_9
Ahmed Al-Gburi, Abduljaleel Al-Hasnawi, L. Lilien
{"title":"Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls","authors":"Ahmed Al-Gburi, Abduljaleel Al-Hasnawi, L. Lilien","doi":"10.1007/978-3-319-58424-9_9","DOIUrl":"https://doi.org/10.1007/978-3-319-58424-9_9","url":null,"abstract":"","PeriodicalId":299836,"journal":{"name":"Computer and Network Security Essentials","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114714777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}