{"title":"Applications of Digital Signatures in Cryptography","authors":"Sarvesh Tanwar, A. Verma","doi":"10.1201/9780429424878-18","DOIUrl":"https://doi.org/10.1201/9780429424878-18","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134536523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime","authors":"Anupama Mishra, B. Gupta, Deepak Gupta","doi":"10.1201/9780429424878-24","DOIUrl":"https://doi.org/10.1201/9780429424878-24","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks","authors":"Parmeet Kaur, Awadhesh Kumar Singh","doi":"10.1201/9780429424878-17","DOIUrl":"https://doi.org/10.1201/9780429424878-17","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132376085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures","authors":"Megha Quamara, B. Gupta","doi":"10.1201/9780429424878-21","DOIUrl":"https://doi.org/10.1201/9780429424878-21","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Maharajan, S. P. Ghrera, Ashutosh Kumar Singh, S. Sahu
{"title":"Medical Image Enhancement Techniques: A Survey","authors":"S. Maharajan, S. P. Ghrera, Ashutosh Kumar Singh, S. Sahu","doi":"10.1201/9780429424878-12","DOIUrl":"https://doi.org/10.1201/9780429424878-12","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port","authors":"Andrea Chiappetta","doi":"10.1201/9780429424878-2","DOIUrl":"https://doi.org/10.1201/9780429424878-2","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in Wireless LAN (WLAN) and WiMAX Systems","authors":"Shashank Gupta, B. Gupta","doi":"10.1201/9780429424878-8","DOIUrl":"https://doi.org/10.1201/9780429424878-8","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126590014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Various Trust Computation Methods: A Step toward Secure FANETs","authors":"Kuldeep Singh, A. Verma, Palvi Aggarwal","doi":"10.1201/9780429424878-7","DOIUrl":"https://doi.org/10.1201/9780429424878-7","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}