ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Case Studies in Secure Computing
Latest Publications
TOTAL DOCUMENTS
22
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By Auerbach Publications
9780429090660
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute-Based Access Control
Case Studies in Secure Computing
◽
10.1201/b17352-9
◽
2014
◽
pp. 112-133
Keyword(s):
Access Control
◽
Attribute Based Access Control
◽
Dynamic Authorization
Download Full-text
Web Session Security: Attack and Defense Techniques
Case Studies in Secure Computing
◽
10.1201/b17352-23
◽
2014
◽
pp. 412-427
◽
Cited By ~ 4
Keyword(s):
Security Attack
◽
Attack And Defense
Download Full-text
Web Application Security Attacks and Countermeasures
Case Studies in Secure Computing
◽
10.1201/b17352-21
◽
2014
◽
pp. 366-395
Keyword(s):
Web Application
◽
Security Attacks
◽
Web Application Security
◽
Application Security
Download Full-text
Reversible Watermarking: Theory and Practice
Case Studies in Secure Computing
◽
10.1201/b17352-20
◽
2014
◽
pp. 334-365
◽
Cited By ~ 1
Keyword(s):
Reversible Watermarking
◽
Theory And Practice
Download Full-text
Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric
Case Studies in Secure Computing
◽
10.1201/b17352-19
◽
2014
◽
pp. 318-333
Keyword(s):
Feature Weighting
◽
False Negatives
◽
Lp Metric
Download Full-text
Classification of Radical Messages on Twitter Using Security Associations
Case Studies in Secure Computing
◽
10.1201/b17352-18
◽
2014
◽
pp. 296-317
Keyword(s):
Security Associations
Download Full-text
Optimizing Ant-Based Internet Protocol Traceback ................................................ AND M. B. GHAZNAVI-GHOUSHCHI
Case Studies in Secure Computing
◽
10.1201/b17352-12
◽
2014
◽
pp. 172-189
Keyword(s):
Internet Protocol
Download Full-text
Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments
Case Studies in Secure Computing
◽
10.1201/b17352-10
◽
2014
◽
pp. 134-147
◽
Cited By ~ 8
Keyword(s):
Open Access
Download Full-text
Attacks in Wireless Sensor Networks and Their Countermeasures
Case Studies in Secure Computing
◽
10.1201/b17352-15
◽
2014
◽
pp. 230-261
◽
Cited By ~ 4
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
Download Full-text
Fuzzy Logic–Based Application Security Risk Assessment
Case Studies in Secure Computing
◽
10.1201/b17352-7
◽
2014
◽
pp. 72-89
Keyword(s):
Risk Assessment
◽
Fuzzy Logic
◽
Security Risk
◽
Application Security
◽
Security Risk Assessment
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close