↓ Skip to main content

Security in Computing and Communications

Overview of attention for book
Cover of 'Security in Computing and Communications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph
  3. Altmetric Badge
    Chapter 2 Fast Verification of Digital Signatures in IoT
  4. Altmetric Badge
    Chapter 3 Efficient and Provably Secure Pairing Free ID-Based Directed Signature Scheme
  5. Altmetric Badge
    Chapter 4 User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition
  6. Altmetric Badge
    Chapter 5 Detection of Zeus Bot Based on Host and Network Activities
  7. Altmetric Badge
    Chapter 6 An Asymmetric Key Based Efficient Authentication Mechanism for Proxy Mobile IPv6 Networks
  8. Altmetric Badge
    Chapter 7 User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem
  9. Altmetric Badge
    Chapter 8 A Ringer-Based Throttling Approach to Mitigate DDoS Attacks
  10. Altmetric Badge
    Chapter 9 NPSO Based Cost Optimization for Load Scheduling in Cloud Computing
  11. Altmetric Badge
    Chapter 10 Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks
  12. Altmetric Badge
    Chapter 11 Security Schemes for Constrained Application Protocol in IoT: A Precise Survey
  13. Altmetric Badge
    Chapter 12 Jordan Center Segregation: Rumors in Social Media Networks
  14. Altmetric Badge
    Chapter 13 Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials
  15. Altmetric Badge
    Chapter 14 Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study
  16. Altmetric Badge
    Chapter 15 Symmetric Key Based Secure Resource Sharing
  17. Altmetric Badge
    Chapter 16 Prevention of PAC File Based Attack Using DHCP Snooping
  18. Altmetric Badge
    Chapter 17 A Quasigroup Based Synchronous Stream Cipher for Lightweight Applications
  19. Altmetric Badge
    Chapter 18 Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model
  20. Altmetric Badge
    Chapter 19 Deep Learning for Network Flow Analysis and Malware Classification
  21. Altmetric Badge
    Chapter 20 Kernel Modification APT Attack Detection in Android
  22. Altmetric Badge
    Chapter 21 Opaque Predicate Detection by Static Analysis of Binary Executables
  23. Altmetric Badge
    Chapter 22 An Overview on Spora Ransomware
  24. Altmetric Badge
    Chapter 23 Pattern Generation and Test Compression Using PRESTO Generator
  25. Altmetric Badge
    Chapter 24 Challenges in Android Forensics
  26. Altmetric Badge
    Chapter 25 Current Consumption Analysis of AES and PRESENT Encryption Algorithms in FPGA Using the Welch Method
  27. Altmetric Badge
    Chapter 26 Spiral Model for Digital Forensics Investigation
  28. Altmetric Badge
    Chapter 27 Smart-Lock Security Re-engineered Using Cryptography and Steganography
  29. Altmetric Badge
    Chapter 28 Adding Continuous Proactive Forensics to Android
  30. Altmetric Badge
    Chapter 29 ASLR and ROP Attack Mitigations for ARM-Based Android Devices
  31. Altmetric Badge
    Chapter 30 CBEAT: Chrome Browser Extension Analysis Tool
  32. Altmetric Badge
    Chapter 31 Hardware Trojan Detection Using Effective Test Patterns and Selective Segmentation
  33. Altmetric Badge
    Chapter 32 Estimation and Tracking of a Ballistic Target Using Sequential Importance Sampling Method
  34. Altmetric Badge
    Chapter 33 An Android Application for Secret Image Sharing with Cloud Storage
  35. Altmetric Badge
    Chapter 34 Tracking of GPS Parameters Using Particle Filter
Attention for Chapter 24: Challenges in Android Forensics
Altmetric Badge

Mentioned by

wikipedia
8 Wikipedia pages

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
48 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Challenges in Android Forensics
Chapter number 24
Book title
Security in Computing and Communications
Published by
Springer, Singapore, September 2017
DOI 10.1007/978-981-10-6898-0_24
Book ISBNs
978-9-81-106897-3, 978-9-81-106898-0
Authors

Sudip Hazra, Prabhaker Mateti, Hazra, Sudip, Mateti, Prabhaker

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 48 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 48 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 11 23%
Student > Bachelor 8 17%
Other 2 4%
Student > Ph. D. Student 2 4%
Lecturer > Senior Lecturer 1 2%
Other 3 6%
Unknown 21 44%
Readers by discipline Count As %
Computer Science 18 38%
Engineering 5 10%
Economics, Econometrics and Finance 1 2%
Business, Management and Accounting 1 2%
Materials Science 1 2%
Other 1 2%
Unknown 21 44%