----- 计算安全案例研究:成就与发展趋势
Survey of Secure Computing Kuruvilla Mathew and Biju Issac Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection Hari Om and Alok Kumar Gupta Fuzzy Logic-Based Application Security Risk Assessment Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks Jayaprakash Kar Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute Based Access Control Jim Longstaff and Tony Howitt Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments Jonny Milliken, Kian Meng Yap, and Alan Marshall Security Attacks and Countermeasures in Cloud Computing Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan Optimizing Ant-Based Internet Protocol Traceback Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi A Case Study on Security Issues in LT E Backhaul and Core Networks Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov A Case Study of Intelligent ID S False Alarm Reduction in Cloud Environments: Challenges and Trends Yuxin Meng, We njuan Li, and Lam-For Kwok Attacks in Wireless Sensor Networks and Their Countermeasures Mukesh Kumar and Kamlesh Dutta Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal The Impact of Application-Layer Denial-of-Service Attacks Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani Classification of Radical Messages on Twitter Using Security Associations Pooja Wadhwa and M. P. S. Bhatia Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric Renato Cordeirode Amorim and Peter Komisarczuk Reversible Watermarking: Theory and Practice Ruchira Naskar and Rajat Subhra Chakraborty Web Application Security Attacks and Countermeasures Tushar Kanti Saha and A. B. M. Shawkat Ali Security in Mobile Networks: A Novel Challenge and Solution Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz Web Session Security: Attack and Defense Techniques Zachary Evans and Hossain Shahriar Internet Botnets: A Survey of Detection Techniques Boris Nechaev and Andrei Gurtov Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case Study Carlos F. Lerma Resendez A Novel Construction of Certificateless Signcryption Scheme for Smart Card Jayaprakash Kar
{{comment.content}}