Image from Google Jackets
Normal view MARC view

Network and information security : issues, challenges and research trends / editors, Nityananda Sarma, Dhurba K. Bhattacharyya.

Contributor(s): Publication details: New Delhi, India : Narosa Pub House, 2013.Description: 180 p.: ill.; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9788184873146 :
  • 818487314X :
Subject(s): LOC classification:
  • TK5105.59 .N379 2013
Contents:
A robust non-blind audio watermarking scheme for secure distribution of audio files {u2013} Fusion of fingerprints and IRIS biometrics using binary particle swarm optimization {u2013} Meta ensemble classifier based stacked generalization for anomaly based intrusion detection {u2013} A review on network security tools and systems {u2013} Formal verification of firewall anomalies {u2013} A graph based approach for Botnet detection {u2013} Dynamic SQL classification: an empirical study {u2013} A survey on web services and trust in cloud computing environment {u2013} A survey of identity-based signatures {u2013} Side channel attacks: surrent researches and future scopes {u2013} A symmetric key generation scheme using chaos theory {u2013} Desirable features of an identity privacy ensuring solution for UMTS {u2013} A review on security vulnerabilities in cognitive radio networks.
Holdings
Item type Current library Home library Shelving location Call number Status Barcode
Books Books American University in Dubai American University in Dubai Main Collection TK 5105.59 .N379 2013 (Browse shelf(Opens below)) Available 5131109

Includes bibliographical references and index.

A robust non-blind audio watermarking scheme for secure distribution of audio files {u2013} Fusion of fingerprints and IRIS biometrics using binary particle swarm optimization {u2013} Meta ensemble classifier based stacked generalization for anomaly based intrusion detection {u2013} A review on network security tools and systems {u2013} Formal verification of firewall anomalies {u2013} A graph based approach for Botnet detection {u2013} Dynamic SQL classification: an empirical study {u2013} A survey on web services and trust in cloud computing environment {u2013} A survey of identity-based signatures {u2013} Side channel attacks: surrent researches and future scopes {u2013} A symmetric key generation scheme using chaos theory {u2013} Desirable features of an identity privacy ensuring solution for UMTS {u2013} A review on security vulnerabilities in cognitive radio networks.

There are no comments on this title.

to post a comment.
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions