ABSTRACT

In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the growing security attacks and countermeasures in the s

chapter 1|26 pages

Survey of Secure Computing

ByKURUVILLA MATHEW, BIJU ISSAC

chapter 2|22 pages

Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection

ByHARI OM AND ALOK KUMAR GUPTA

chapter 3|18 pages

Fuzzy Logic–Based Application Security Risk Assessment

ByHOSSAIN SHAHRIAR, HISHAM M. HADDAD, ISHAN VAIDYA

chapter 6|14 pages

Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments

ByJONNY MILLIKEN, KIAN MENG YAP, AND ALAN MARSHALL

chapter 7|24 pages

Security Attacks and Countermeasures in Cloud Computing

ByKASHIF MUNIR, LAWAN AHMAD MOHAMMAD, AND SELLAPAN PALANIAPPAN

chapter 8|18 pages

Optimizing Ant-Based Internet Protocol Traceback ................................................ AND M. B. GHAZNAVI-GHOUSHCHI

ByMOHAMMAD HAMEDI-HAMZEHKOLAIE, MOHAMMAD JAVAD SHAMANI,

chapter 11|32 pages

Attacks in Wireless Sensor Networks and Their Countermeasures

ByMUKESH KUMAR, KAMLESH DUTTA

chapter 12|22 pages

Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications

ByMUTHULAKSHMI ANGAMUTHU, R. ANITHA, THANALAKSHMI PERUMAL

chapter 13|12 pages

The Impact of Application-Layer Denial-of-Service Attacks

ByHUGO GONZALEZ, MARC ANTOINE GOSSELIN-LAVIGNE, NATALIA STAKHANOVA, AND ALI A. GHORBANI

chapter 14|22 pages

Classification of Radical Messages on Twitter Using Security Associations

ByPOOJA WADHWA AND M. P. S. BHATIA

chapter 15|16 pages

Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric

ByRENATO CORDEIRO DE AMORIM AND PETER KOMISARCZUK

chapter 16|32 pages

Reversible Watermarking: Theory and Practice

ByRUCHIRA NASKAR AND RAJAT SUBHRA CHAKRABORTY

chapter 17|30 pages

Web Application Security Attacks and Countermeasures

ByTUSHAR KANTI SAHA AND A. B. M. SHAWKAT ALI

chapter 18|16 pages

Security in Mobile Networks: A Novel Challenge and Solution

ByTRAN QUANG THANH, YACINE REBAHI, AND THOMAS MAGEDANZ

chapter 19|16 pages

Web Session Security: Attack and Defense Techniques

ByZACHARY EVANS, HOSSAIN SHAHRIAR

chapter 20|20 pages

Internet Botnets: A Survey of Detection Techniques

ByBORIS NECHAEV, ANDREI GURTOV