Handbook of Research on Threat Detection and Countermeasures in Network Security

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures...

Full description

Saved in:
Bibliographic Details
Main Authors Al-Hamami, Alaa Hussein, Waleed al-Saadoon, Ghossoon M
Format eBook Publication
LanguageEnglish
Published Hershey IGI Global Scientific Publishing 2014
IGI Global
Edition1
Subjects
Online AccessGet full text
ISBN9781466665835
1466665831
9781466665866
1466665866
9781466665842
146666584X
DOI10.4018/978-1-4666-6583-5

Cover

Table of Contents:
  • Title Page -- Copyright Page -- Book Series -- Dedication -- Editorial Advisory Board and List of Reviewers -- List of Contributors -- Table of Contents -- Detailed Table of Contents -- Preface -- Acknowledgment -- Chapter 1: Security Concepts, Developments, and Future Trends -- Chapter 2: Enhance Network Intrusion Detection System by Exploiting BR Algorithm as an Optimal Feature Selection -- Chapter 3: Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat -- Chapter 4: Real Time Internal Intrusion Detection -- Chapter 5: Authentication Model for Enterprise Resource Planning Network -- Chapter 6: Cryptographic Hash Function -- Chapter 7: Crime Profiling System -- Chapter 8: Proposals to Win the Battle Against Cyber Crime -- Chapter 9: Cyber Crimes -- Chapter 10: Cyber Space Security Assessment Case Study -- Chapter 11: Biometric Security -- Chapter 12: Data Hiding Schemes Based on Singular Value Decomposition -- Chapter 13: Malay Language Text-Based Anti-Spam System Using Neural Network -- Chapter 14: Virtualization Technology and Security Challenges -- Chapter 15: The Impact of Big Data on Security -- Chapter 16: 16-Directional Geographical Traceback with Generalization to Three Dimensional Multidirectional Geographical IP Traceback -- Chapter 17: A New Approach in Cloud Computing User Authentication -- Chapter 18: Trust Determination in Wireless Ad Hoc Networks -- Chapter 19: Security in Mobile Computing -- Chapter 20: The Security Impacts on Social Media Platforms -- Chapter 21: Security in Digital Images -- Compilation of References -- About the Contributors -- Index