Information Security Handbook最新文献

筛选
英文 中文
Key Authentication Schemes for Medical Cyber Physical System 医疗网络物理系统密钥认证方案
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-8
Zia ur Rehman, S. Altaf, Saleem Iqbal, Khalid Hussain, Kashif Sattar
{"title":"Key Authentication Schemes for Medical Cyber Physical System","authors":"Zia ur Rehman, S. Altaf, Saleem Iqbal, Khalid Hussain, Kashif Sattar","doi":"10.1201/9780367808228-8","DOIUrl":"https://doi.org/10.1201/9780367808228-8","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona 基于哈希函数和数字角色的成本导向电子投票系统
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-12
Muhammad Talha Saleem, Noor Ul-Ain, Zartaj Tahir
{"title":"Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona","authors":"Muhammad Talha Saleem, Noor Ul-Ain, Zartaj Tahir","doi":"10.1201/9780367808228-12","DOIUrl":"https://doi.org/10.1201/9780367808228-12","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks 基于聚类算法的IDS特征分组检测已知/未知攻击
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-6
Ravishanker, Monica Sood, P. Angra, Sahil Verma, Kavita, Noor Zaman Jhanjhi
{"title":"Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks","authors":"Ravishanker, Monica Sood, P. Angra, Sahil Verma, Kavita, Noor Zaman Jhanjhi","doi":"10.1201/9780367808228-6","DOIUrl":"https://doi.org/10.1201/9780367808228-6","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123073318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software-Defined Networking (SDN) Security Concerns 软件定义网络(SDN)安全问题
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-2
Muhammad Junaid Nazar, Saleem Iqbal, S. Altaf, K. Qureshi, Khalid Usmani, Sobia Wassan
{"title":"Software-Defined Networking (SDN) Security Concerns","authors":"Muhammad Junaid Nazar, Saleem Iqbal, S. Altaf, K. Qureshi, Khalid Usmani, Sobia Wassan","doi":"10.1201/9780367808228-2","DOIUrl":"https://doi.org/10.1201/9780367808228-2","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114205180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Street Light Control Based on Pedestrian and Automobile Detection 基于行人和汽车检测的路灯自动控制
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-11
R. Sujatha, J. Gitanjali, R. P. Kumar, Mustansar Ali, Ghazanfar, Baibhav Pathy, J. Chatterjee
{"title":"Automatic Street Light Control Based on Pedestrian and Automobile Detection","authors":"R. Sujatha, J. Gitanjali, R. P. Kumar, Mustansar Ali, Ghazanfar, Baibhav Pathy, J. Chatterjee","doi":"10.1201/9780367808228-11","DOIUrl":"https://doi.org/10.1201/9780367808228-11","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID 基于物联网rfid智能聊天机器人的区块链供应链系统
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-13
Khurram Shahzad, Hasnat Ahmed, F. Ahsan, Khalid Hussain, M. N. Talib
{"title":"Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID","authors":"Khurram Shahzad, Hasnat Ahmed, F. Ahsan, Khalid Hussain, M. N. Talib","doi":"10.1201/9780367808228-13","DOIUrl":"https://doi.org/10.1201/9780367808228-13","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network 基于分数的集群级混合多通道无线传感器网络MAC协议
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-1
Sowjanya Ramisetty, Divya Anand, Kavita, Sahil Verma, A. Alaboudi
{"title":"SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network","authors":"Sowjanya Ramisetty, Divya Anand, Kavita, Sahil Verma, A. Alaboudi","doi":"10.1201/9780367808228-1","DOIUrl":"https://doi.org/10.1201/9780367808228-1","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125245422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PDF Malware Classifiers – A Survey, Future Directions and Recommended Methodology PDF恶意软件分类器-调查,未来的方向和推荐的方法
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-7
N. S. Vishnu, Sripada Manasa Lakshmi, Kavita, Sahil Verma, Awadhesh Kumar Shukla
{"title":"PDF Malware Classifiers – A Survey, Future Directions and Recommended Methodology","authors":"N. S. Vishnu, Sripada Manasa Lakshmi, Kavita, Sahil Verma, Awadhesh Kumar Shukla","doi":"10.1201/9780367808228-7","DOIUrl":"https://doi.org/10.1201/9780367808228-7","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123773367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ransomware Attack: Threats & Different Detection Technique 勒索软件攻击:威胁和不同的检测技术
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-9
Rakhi Seth, Aakanksha Sharaff, J. Chatterjee, Noor Zaman Jhanjhi
{"title":"Ransomware Attack: Threats & Different Detection Technique","authors":"Rakhi Seth, Aakanksha Sharaff, J. Chatterjee, Noor Zaman Jhanjhi","doi":"10.1201/9780367808228-9","DOIUrl":"https://doi.org/10.1201/9780367808228-9","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"30 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prevention of DOS/DDOS Attacks Through Expert Honey Mesh Security Infrastructure 通过蜜网安全基础设施预防DOS/DDOS攻击
Information Security Handbook Pub Date : 2022-01-04 DOI: 10.1201/9780367808228-5
Shehneela Khan, Tariq Ali, U. Draz, S. Yasin, M. Khan, Amjad Ali
{"title":"Prevention of DOS/DDOS Attacks Through Expert Honey Mesh Security Infrastructure","authors":"Shehneela Khan, Tariq Ali, U. Draz, S. Yasin, M. Khan, Amjad Ali","doi":"10.1201/9780367808228-5","DOIUrl":"https://doi.org/10.1201/9780367808228-5","url":null,"abstract":"","PeriodicalId":431328,"journal":{"name":"Information Security Handbook","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信