Springer International Publishing AG, 2018. — 609 p. — ISBN: 978-3-319-58423-2.
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers.
Computer Security
A Survey and Taxonomy of Classifiers of Intrusion Detection Systems
A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics
Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining
A Postmortem Forensic Analysis for a JavaScript Based Attack
Malleable Cryptosystems and Their Applications in Wireless Sensor Networks
A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems
Security Protocols for Networks and Internet: A Global Vision
Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls
Reliable Transmission Protocol for Underwater Acoustic Networks
Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study
Searching Encrypted Data on the Cloud
A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services
Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers
Secure Elliptic Curves in Cryptography
Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis
Biometric Systems for User Authentication
Biometric Authentication and Data Security in Cloud Computing
Approximate Search in Digital Forensics
Privacy Preserving Internet Browsers: Forensic Analysis of Browzar
Experimental Digital Forensics of Subscriber Identification Module (SIM) Card
A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks
Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns
Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment
Securing the Internet of Things: Best Practices for Deploying IoT Devices
Cognitive Computing and Multiscale Analysis for Cyber Security
A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems
Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts
A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems
Accountability for Federated Clouds
A Cognitive and Concurrent Cyber Kill Chain Model
Defense Methods Against Social Engineering Attacks