Information Security Practices

Information Security Practices

Emerging Threats and Perspectives

Awad, Ahmed; Traore, Issa; Woungang, Isaac

Springer International Publishing AG

07/2018

104

Mole

Inglês

9783319840543

15 a 20 dias

1825

Descrição não disponível.
Chapter 1.Introduction - Emerging Threats call for New Security Paradigms.- Chapter 2. Botnets Threat Analysis and Detection.- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics.- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis.- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis.- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication.- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection.- Chapter 8. Conclusion: Future Trends and Challenges.
Cyber Security;Information Assurance;Information Protection;Information Privacy;Biometrics;Information Authentication;Information Authorization;Intrusion Protection