↓ Skip to main content

Information Systems Security

Overview of attention for book
Cover of 'Information Systems Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms
  3. Altmetric Badge
    Chapter 2 Practical DoS Attacks on Embedded Networks in Commercial Vehicles
  4. Altmetric Badge
    Chapter 3 Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment
  5. Altmetric Badge
    Chapter 4 SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing
  6. Altmetric Badge
    Chapter 5 Building a Fair System Using Access Rights
  7. Altmetric Badge
    Chapter 6 Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
  8. Altmetric Badge
    Chapter 7 Data Loss Prevention Based on Text Classification in Controlled Environments
  9. Altmetric Badge
    Chapter 8 Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications
  10. Altmetric Badge
    Chapter 9 An Efficient Certificateless Signature Scheme in the Standard Model
  11. Altmetric Badge
    Chapter 10 Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption
  12. Altmetric Badge
    Chapter 11 Enhanced Modulo Based Multi Secret Image Sharing Scheme
  13. Altmetric Badge
    Chapter 12 Performance Evaluation of Modified Henon Map in Image Encryption
  14. Altmetric Badge
    Chapter 13 Network Counter-Attack Strategy by Topology Map Analysis
  15. Altmetric Badge
    Chapter 14 Network Vulnerability Analysis Using a Constrained Graph Data Model
  16. Altmetric Badge
    Chapter 15 Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid
  17. Altmetric Badge
    Chapter 16 A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations
  18. Altmetric Badge
    Chapter 17 On the Security of “Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems”
  19. Altmetric Badge
    Chapter 18 Privacy Preserving Network Analysis of Distributed Social Networks
  20. Altmetric Badge
    Chapter 19 Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data
  21. Altmetric Badge
    Chapter 20 Risk Evaluation of X.509 Certificates – A Machine Learning Application
  22. Altmetric Badge
    Chapter 21 A Secure Routing Scheme for Wireless Mesh Networks
  23. Altmetric Badge
    Chapter 22 Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches
  24. Altmetric Badge
    Chapter 23 Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks
  25. Altmetric Badge
    Chapter 24 JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET
  26. Altmetric Badge
    Chapter 25 A Solution to Detect Phishing in Android Devices
  27. Altmetric Badge
    Chapter 26 Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic
  28. Altmetric Badge
    Chapter 27 Honeypot Deployment in Broadband Networks
  29. Altmetric Badge
    Chapter 28 Generic Construction of Certificateless Signcryption Scheme
  30. Altmetric Badge
    Chapter 29 Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme
  31. Altmetric Badge
    Chapter 30 Towards Useful Anomaly Detection for Back Office Networks
  32. Altmetric Badge
    Chapter 31 Detection of SQLite Database Vulnerabilities in Android Apps
  33. Altmetric Badge
    Chapter 32 Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

1 policy source
2 patents


3 Dimensions

Readers on

13 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Information Systems Security
Published by
Springer International Publishing, November 2016
DOI 10.1007/978-3-319-49806-5
978-3-31-949805-8, 978-3-31-949806-5

Ray, Indrajit, Gaur, Manoj Singh, Conti, Mauro, Sanghi, Dheeraj, Kamakoti, V.

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 13 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 13 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 15%
Student > Master 2 15%
Student > Bachelor 1 8%
Other 1 8%
Student > Doctoral Student 1 8%
Other 1 8%
Unknown 5 38%
Readers by discipline Count As %
Computer Science 6 46%
Social Sciences 1 8%
Engineering 1 8%
Unknown 5 38%