


default search action
Handbook of Computer Networks and Cyber Security, 2020
- Brij B. Gupta

, Gregorio Martínez Pérez, Dharma P. Agrawal, Deepak Gupta:
Handbook of Computer Networks and Cyber Security, Principles and Paradigms. Springer 2020, ISBN 978-3-030-22276-5 - Chaitanya Vemulapalli, Sanjay Kumar Madria, Mark Linderman:

Security Frameworks in Mobile Cloud Computing. 1-41 - Ahmed Manasrah, M. A. Shannaq, Mahmoud Abu Nasir:

An Investigation Study of Privacy Preserving in Cloud Computing Environment. 43-61 - Mouna Jouini, Latifa Ben Arfa Rabai:

Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud Computing Case Study. 63-90 - Dharavath Ramesh, Syam Kumar Pasupuleti:

A Novel AckIBE-Based Secure Cloud Data Management Framework. 91-110 - Kale Rahul Vishwanath, Bharadwaj Veeravalli, Xiaoli Wang:

A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud Platforms. 111-131 - Andrea Vázquez-Ingelmo

, Á. M. Moreno-Montero
, Francisco José García-Peñalvo
:
Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their Countermeasures. 133-172 - Moumita Roy

, Chandreyee Chowdhury, Nauman Aslam:
Security and Privacy Issues in Wireless Sensor and Body Area Networks. 173-200 - Avani Vyas

, Sujata Pal:
Preventing Security and Privacy Attacks in WBANs. 201-225 - Usha Jain

, Muzzammil Hussain:
Underwater Wireless Sensor Networks. 227-245 - Mahendra Kumar Murmu, Awadhesh Kumar Singh:

Security Issues in Cognitive Radio Ad Hoc Networks. 247-264 - Rachna Jain

, Nikita Jain, Anand Nayyar:
Security and Privacy in Social Networks: Data and Structural Anonymity. 265-293 - Neeraj Jain

, Balwinder Raj
:
SOI FinFET for Computer Networks and Cyber Security Systems. 295-311 - Sumit Badotra, Surya Narayan Panda

:
Software-Defined Networking: A Novel Approach to Networks. 313-339 - Arash Shaghaghi, Mohamed Ali Kâafar

, Rajkumar Buyya
, Sanjay Jha
:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. 341-387 - Tushar Ubale, Ankit Kumar Jain:

Survey on DDoS Attack Techniques and Solutions in Software-Defined Network. 389-419 - Prachi Gulihar, Brij B. Gupta

:
Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks. 421-443 - Biswarup Samanta:

Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce Network. 445-459 - Mohammed Saeed Alkatheiri, Abdur Rashid Sangi, Satish Anamalamudi:

Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. 461-473 - Sudesh Rani

, Poonam Saini:
Fog Computing: Applications and Secure Data Aggregation. 475-492 - Bhumika Paharia, Kriti Bhushan:

A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment. 493-524 - Christos Stergiou, Andreas P. Plageras, Konstantinos E. Psannis

, Brij B. Gupta
:
Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network. 525-554 - Richa, Teek Parval Sharma

, Ajay Kumar Sharma:
Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive Study. 555-584 - Mohamed Alloghani, Thar Baker

, Dhiya Al-Jumeily
, Abir Hussain
, Jamila Mustafina
, Ahmed J. Aljaaf:
A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems. 585-608 - Manjunath Kotari

, Niranjan N. Chiplunkar
:
Investigation of Security Issues in Distributed System Monitoring. 609-634 - Aakanksha Tewari, Brij B. Gupta

:
An Analysis of Provable Security Frameworks for RFID Security. 635-651 - Sangeeta Mittal

, Shivani Tyagi:
Computational Techniques for Real-Time Credit Card Fraud Detection. 653-681 - Bharat Bhushan

, Gadadhar Sahoo:
Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective. 683-713 - Anil Kumar

, Ravinder Kumar:
Privacy Preservation of Electronic Health Record: Current Status and Future Direction. 715-739 - Hicham Amellal

, Abdelmajid Meslouhi
, Abderahim El Allati
, Anass El Haddadi
:
QKD Protocols Security Between Theory and Engineering Implementation. 741-762 - Priyanka Datta, Shanu Bhardwaj, Surya Narayan Panda

, Sarvesh Tanwar
, Sumit Badotra:
Survey of Security and Privacy Issues on Biometric System. 763-776 - Arpita Sarkar, Binod Kumar Singh

:
A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics. 777-805 - Cyrus F. Nourani:

Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces. 807-823 - Kishore Bhamidipati, Soorya Annadurai

:
Permutation-Substitution Based Image Encryption Algorithms Using Pseudorandom Number Generators. 825-848 - Ravinder Kumar, Hitesh Singh

:
Recent Trends in Text Steganography with Experimental Study. 849-872 - Kishor Kumar Gulla

, P. Viswanath, Suresh Babu Veluru, R. Raja Kumar:
Machine Learning Based Intrusion Detection Techniques. 873-888 - Mouhammd Al-Kasassbeh, Safaa Mohammed, Mohammad Alauthman

, Ammar Almomani
:
Feature Selection Using a Machine Learning to Classify a Malware. 889-904 - R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:

DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection. 905-928 - Priyanka Dhaka, Bharti Nagpal:

ABFT: Analytics to Uplift Big Social Events Using Forensic Tools. 929-948 - Palvi Aggarwal

, Cleotilde Gonzalez, Varun Dutt
:
HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory. 949-959

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














