Case Studies in Secure Computing: Achievements and Trends Front Cover

Case Studies in Secure Computing: Achievements and Trends

  • Length: 500 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2014-08-29
  • ISBN-10: 1482207060
  • ISBN-13: 9781482207064
  • Sales Rank: #7729125 (See Top 100 Books)
Description

In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.

This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book:

  • Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection
  • Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples
  • Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks
  • Investigates various malicious activities associated with cloud computing and proposes some countermeasures
  • Examines current and emerging security threats in long-term evolution backhaul and core networks
  • Supplies a brief introduction to application-layer denial-of-service (DoS) attacks

Illustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon.

This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.

Table of Contents

Chapter 1: Survey of Secure Computing
Chapter 2: Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection
Chapter 3: Fuzzy Logic–Based Application Security Risk Assessment
Chapter 4: Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks
Chapter 5: Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute-Based Access Control
Chapter 6: Design and Analysis of Independent, Open- Access Wi-Fi Monitoring Infrastructures in Live Environments
Chapter 7: Security Attacks and Countermeasures in Cloud Computing
Chapter 8: Optimizing Ant-Based Internet Protocol Traceback
Chapter 9: A Case Study on Security Issues in LTE Backhaul and Core Networks
Chapter 10: A Case Study of Intelligent IDS False Alarm Reduction in Cloud Environments: Challenges and Trends
Chapter 11: Attacks in Wireless Sensor Networks and Their Countermeasures
Chapter 12: Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications
Chapter 13: The Impact of Application-Layer Denial-of- Service Attacks
Chapter 14: Classification of Radical Messages on Twitter Using Security Associations
Chapter 15: Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric
Chapter 16: Reversible Watermarking: Theory and Practice
Chapter 17: Web Application Security Attacks and Countermeasures
Chapter 18: Security in Mobile Networks: A Novel Challenge and Solution
Chapter 19: Web Session Security: Attack and Defense Techniques
Chapter 20: Internet Botnets: A Survey of Detection Techniques
Chapter 21: Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case Study
Chapter 22: A Novel Construction of Certificateless Signcryption Scheme for Smart Card

To access the link, solve the captcha.