Ammar Almomani, O. Dorgham, Mohammad Alauthman, M. Al-Refai, N. Aslam
{"title":"Botnet Behavior and Detection Techniques: A Review","authors":"Ammar Almomani, O. Dorgham, Mohammad Alauthman, M. Al-Refai, N. Aslam","doi":"10.1201/9780429424878-9","DOIUrl":"https://doi.org/10.1201/9780429424878-9","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124007886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-19DOI: 10.1201/9780429424878-16
B. B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta
{"title":"DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms","authors":"B. B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta","doi":"10.1201/9780429424878-16","DOIUrl":"https://doi.org/10.1201/9780429424878-16","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk","authors":"Baidyanath Biswas, S. Patra","doi":"10.1201/9780429424878-3","DOIUrl":"https://doi.org/10.1201/9780429424878-3","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-19DOI: 10.1201/9780429424878-10
Diksha Goel, A. Jain
{"title":"Overview of Smartphone Security: Attack and Defense Techniques","authors":"Diksha Goel, A. Jain","doi":"10.1201/9780429424878-10","DOIUrl":"https://doi.org/10.1201/9780429424878-10","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114535703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alberto Huertas Celdrán, M. Pérez, F. J. G. Clemente, G. Pérez
{"title":"Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior","authors":"Alberto Huertas Celdrán, M. Pérez, F. J. G. Clemente, G. Pérez","doi":"10.1201/9780429424878-1","DOIUrl":"https://doi.org/10.1201/9780429424878-1","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-19DOI: 10.1201/9780429424878-23
Jasminder Kaur Sandhu, A. Verma, P. Rana
{"title":"A Compendium of Security Issues in Wireless Sensor Networks","authors":"Jasminder Kaur Sandhu, A. Verma, P. Rana","doi":"10.1201/9780429424878-23","DOIUrl":"https://doi.org/10.1201/9780429424878-23","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse","authors":"S. devi, Mohd. Aarif Rather","doi":"10.1201/9780429424878-4","DOIUrl":"https://doi.org/10.1201/9780429424878-4","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121323084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-19DOI: 10.1201/9780429424878-22
Somya Ranjan Sahoo, B. Gupta
{"title":"Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective","authors":"Somya Ranjan Sahoo, B. Gupta","doi":"10.1201/9780429424878-22","DOIUrl":"https://doi.org/10.1201/9780429424878-22","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132966294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-19DOI: 10.1201/9780429424878-19
D. Edla, G. Pedunayak, K. Tejaswini, K. Hareesh, Ramalingaswamy Cheruku
{"title":"Credit Scoring Using Birds Swarm Optimization","authors":"D. Edla, G. Pedunayak, K. Tejaswini, K. Hareesh, Ramalingaswamy Cheruku","doi":"10.1201/9780429424878-19","DOIUrl":"https://doi.org/10.1201/9780429424878-19","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115919224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-19DOI: 10.1201/9780429424878-13
Shiza Hassan, M. Alam, Tanveer Khan, N. Javaid, Abid Khan
{"title":"Extraction of Malware IOCs and TTPs Mapping with CoAs","authors":"Shiza Hassan, M. Alam, Tanveer Khan, N. Javaid, Abid Khan","doi":"10.1201/9780429424878-13","DOIUrl":"https://doi.org/10.1201/9780429424878-13","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}