What is included with this book?
Machine Learning and Intelligence | |
Collective Classification for Spam Filtering | p. 1 |
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps | p. 9 |
Approach Based Ensemble Methods for Better and Faster Intrusion Detection | p. 17 |
Application of the Generic Feature Selection Measure in Detection of Web Attacks | p. 25 |
Data Aggregation Based on Fuzzy Logic for VANETs | p. 33 |
Network Security | |
Digging into IP Flow Records with a Visual Kernel Method | p. 41 |
Opcode-Sequence-Based Semi-supervised Unknown Malware Detection | p. 50 |
A New Alert Correlation Algorithm Based on Attack Graph | p. 58 |
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification | p. 68 |
Security Alert Correlation Using Growing Neural Gas | p. 76 |
A Comparative Performance Evaluation of DNS Tunneling Tools | p. 84 |
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols | p. 92 |
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network | p. 100 |
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans | p. 109 |
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP | p. 118 |
Cryptography | |
Structural Properties of Cryptographic Sequences | p. 127 |
A Multisignature Scheme Based on the SDLP and on the IFP | p. 135 |
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems | p. 143 |
Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast | p. 151 |
Java Car$mplementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields | p. 160 |
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate Signatures | p. 168 |
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm | p. 177 |
Improving the Message Expansion of the Tangle Hash Function | p. 183 |
Cryptosystem with One Dimensional Chaotic Maps | p. 190 |
Securing Software | |
A Quantitative Analysis into the Economics of Correcting Software Bugs | p. 198 |
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls | p. 206 |
An Approach for Adapting Moodle into a Secure Infrastructure | p. 214 |
On Secure JAVA Application in SOA-Based PKI Mobile Government Systems | p. 222 |
Applications of Intelligent Methods for Security | |
Structural Feature Based Anomaly Detection for Packed Executable Identification | p. 230 |
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System | p. 238 |
Scientific Gateway and Visualization Tool | p. 246 |
An Innovative Framework for Securing Unstructured Documents | p. 251 |
Use of Schema Associative Mapping for Synchronization of the Virtual | p. 259 |
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques | p. 265 |
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems | p. 272 |
An Innovative Linkage Learning Based on Differences in Local Optimums | p. 285 |
A New Particle Swarm Optimization for Dynamic Environments | p. 293 |
A Classifier Ensemble for Face Recognition Using Gabor Wavelet Features | p. 301 |
Author Index | p. 309 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.